openssl s_client -connect server.example.org:443 -ssl3
openssl s_client -connect server.example.org:443 -ssl2
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773941#p27773941:3dlls1n2 said:doubledeej[/url]":3dlls1n2]On the sites I develop, someone could get ahold of a session key from one of my sites' clients, but it wouldn't do a lot of good because the instant they try to use it from a different IP address or browser they get logged out. Making this type of attack have limited use against my company.
There is nothing wrong with AES-CBC! There is plenty wrong in the way TLS applies the HMAC-SHA authentication to it (or more to the point doesn't apply it to the padding) opening up a timing side channel. That side channel can be mitigated in software with some difficulty so they just didn't bother to fix it in TLS1.2. For that matter TLS1.2 is not more secure than TLS1.1 unless you only enable GCM cipher suites. It just has the potential to be more secure, but your security is fundamentally bounded by the weakest combination of protocol+ciphersuite that your client is willing to accept.[url=http://meincmagazine.com/civis/viewtopic.php?p=27773733#p27773733:1tx7knbh said:ThermalNoise[/url]":1tx7knbh]This is somewhat mitigated by the fact that a lot of sites switched to prefer RC4 over AES-CBC because it prevented the earlier BEAST attack. The POODLE attack will not work against RC4, though RC4 is old and broken in its own (somewhat less catastrophic) ways. Once again goes to show that a good implementation matters much more than a secure encryption primitive. (The more modern AES-CBC has fatal flaws that don't affect RC4, despite its age.)
Or ChaCha20+Poly which is bloody fast if you use SSE2...The real fix is the AES-GCM authenticated-encryption mode, though it is becoming a single point of failure. We need new authenticated-encryption modes for diversity; hopefully NIST approves SHA-3/Keccak for authenticated encryption soon.
That's why there are other factors included, not just the IP.[url=http://meincmagazine.com/civis/viewtopic.php?p=27774059#p27774059:94a8gwau said:jdhardy[/url]":94a8gwau][url=http://meincmagazine.com/civis/viewtopic.php?p=27773941#p27773941:94a8gwau said:doubledeej[/url]":94a8gwau]On the sites I develop, someone could get ahold of a session key from one of my sites' clients, but it wouldn't do a lot of good because the instant they try to use it from a different IP address or browser they get logged out. Making this type of attack have limited use against my company.
Doesn't help in this case: imagine a malicious public access point with NAT. The user's IP address will be the same to your server (because NAT) but the AP is still reading the traffic and can impersonate the user if desired (but more likely they just scrape useful info).
I do this for some applications where I know the users and know their IP addresses are pretty static. But in the general case, you can't expect that; phones get different IP addresses all the time and in my office the IP address changes regularly during work hours. In this specific office the IP's are picked from a known pool so my application can use that knowledge, but in the general case, it won't work.[url=http://meincmagazine.com/civis/viewtopic.php?p=27773941#p27773941:2701vzod said:doubledeej[/url]":2701vzod]Developers who take security seriously shouldn't be accepting session keys from any IP address other than the one to which it was originally issued. Yes, this potentially does mean additional login requests for users, but it also mitigates most potential attacks from an issue like this. And it really doesn't happen that often. Most users' IP addresses don't change unless they reboot their modems.
My sites have been doing it for 6 years, and I've never received a complaint about it.[url=http://meincmagazine.com/civis/viewtopic.php?p=27774115#p27774115:110h07x0 said:drfisheye[/url]":110h07x0]I do this for some applications where I know the users and know their IP addresses are pretty static. But in the general case, you can't expect that; phones get different IP addresses all the time and in my office the IP address changes regularly during work hours. In this specific office the IP's are picked from a known pool so my application can use that knowledge, but in the general case, it won't work.[url=http://meincmagazine.com/civis/viewtopic.php?p=27773941#p27773941:110h07x0 said:doubledeej[/url]":110h07x0]Developers who take security seriously shouldn't be accepting session keys from any IP address other than the one to which it was originally issued. Yes, this potentially does mean additional login requests for users, but it also mitigates most potential attacks from an issue like this. And it really doesn't happen that often. Most users' IP addresses don't change unless they reboot their modems.
Five years later it was already known to be still problem...[url=http://meincmagazine.com/civis/viewtopic.php?p=27773955#p27773955:1n3g4vkp said:PhilipStorry[/url]":1n3g4vkp][url=http://meincmagazine.com/civis/viewtopic.php?p=27773647#p27773647:1n3g4vkp said:CaptainTightpants[/url]":1n3g4vkp]According to the page the article referenced (containing instructions on patching IE and Chrome), they tested the top 1MM Alexa sites and listed those not supporting anything better than SSL3 (said list appears below the instructions). Makes for interesting reading with citibank.com right at the top (although it seems not to be the case any longer having just tried it myself under Firefox limited to TLS1.2). Can't imagine Citi will be happy.
EDIT: Looks like there are a LOT of Citi domains there. Watch out you Citi-folk.
EDIT 2: According to another post below this may not be a problem, but I'd still be cautious if you use any "citi" domain variations.
I'm no security expert, but it seems to me that none of this should be particularly surprising for anyone who's been watching this kind of thing for long enough. It's public knowledge that SSL/TLS version support has been parlous on the internet for years... But it tends to get reported only dryly, in areas like the release notes for builds of web browsers.
That's certainly where I first came across it, back in 2006. I think I was first alerted by a blog post by Opera's devs - they'd put TLS 1.1 and TLS 1.1. extensions, and it broke lots of things due to bad server-side responses.
Took me a while to find the actual blog post - mostly due to My Opera closing down - I had to find another post that referred to it (https://dev.opera.com/blog/new-in-opera ... 2-support/) and then go to the Wayback Machine:
http://web.archive.org/web/200607141139 ... dml/319177
So, since at least 2006, web browser vendors have known that turning on better security breaks sites, and have resorted to nasty kludges and convoluted code - and code convolution itself can bring security issues, so often the answer was to disable by default...
The most likely causes on the server side are ancient & badly written enterprise software (no names mentioned, you can probably guess accurately enough) or badly configured/broken accelerator hardware or cache layers...
I'd kind of hoped that things have gotten better - maybe they have since 2006, it's difficult to know for sure - but this is an area where an article by a trusted source like Ars might at least help get the problem the visibility it deserves, in order to start shaming the cheapskates^Wnegligent into fixing their infrastructure.
tl;dr: Decent support for later versions of TLS is lacking, especially in larger enterprises. This is widely talked about, but nobody's ever kicked up a fuss because previously compatibility was more important than providing better security. That should change - but don't hold your breath.
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773659#p27773659:23mq5972 said:lamawithonel[/url]":23mq5972]I heard the rumblings about this earlier today and disabled SSLv3 in my browser, but already I've had to re-enable it to book a room with a major hotel chain.
[url=http://meincmagazine.com/civis/viewtopic.php?p=27774153#p27774153:11gw70z9 said:DKlimax[/url]":11gw70z9]
Five years later it was already known to be still problem...
http://blogs.msdn.com/b/ieinternals/arc ... s-1.2.aspx
it's still widely supported on both servers and clients alike, and is still required for compatibility with Internet Explorer 6
Developers who take security seriously should wean themselves away from schemes that depend on the user having a stable IPv4 address.[url=http://meincmagazine.com/civis/viewtopic.php?p=27773941#p27773941:1292w85m said:doubledeej[/url]":1292w85m]Developers who take security seriously shouldn't be accepting session keys from any IP address other than the one to which it was originally issued. Yes, this potentially does mean additional login requests for users, but it also mitigates most potential attacks from an issue like this. And it really doesn't happen that often. Most users' IP addresses don't change unless they reboot their modems.
On the sites I develop, someone could get ahold of a session key from one of my sites' clients, but it wouldn't do a lot of good because the instant they try to use it from a different IP address or browser they get logged out. Making this type of attack have limited use against my company.
This technique doesn't cover every scenario, but it sure could be a difficult bar to pass. Someone would have to be on the same network and mimic the user agent string (as well as other browser attributes) to hack into one of my sites.
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773609#p27773609:1c542opy said:gpriatko[/url]":1c542opy]> Every https site I've checked so far is using TLS
Which TLS?
SSLv3 and TLS1.0 are equally at risk.
TLS1.1 isn't a pretty sight.
TLS1.2 is where we need to be.
Major sites have already converted in the last few hours.
Akamai was going to block SSLv3, TLS1.0, and TLS1.1 next week. They've moved that up to 'right now'. Going to be some long bridge calls tonight ;-)
[url=http://meincmagazine.com/civis/viewtopic.php?p=27774477#p27774477:h95oz6eh said:Knoware[/url]":h95oz6eh]I went to the Mozilla page linked in the article and looked at the Add-On and attempted to install it, Firefox warns me the Author isn't verified and tells me I shouldn't trust it!
I'm no security expert either and when I see that nice lock icon and the "Mozilla.org certified" stamp, it really makes me wonder...
To be clearer. This is the link in the Mozilla page that the articled linked to that gives me the warning:
https://addons.mozilla.org/en-US/firefo ... n-control/
Some might consider this a feature[url=http://meincmagazine.com/civis/viewtopic.php?p=27774687#p27774687:2l1c3nxg said:Decoherent[/url]":2l1c3nxg]It's worth noting that Ars Technica itself doesn't work unless you allow TLS 1.0, which is irritating, because I can't move my minimum security settings up above that for the internet in general.
My apologies, this morning when I had Firefox set to TLS 1.2 only, I was getting a broken page. Now, however, it's working. I did test IE 11 as well; with TLS 1.2 the login box on the front page was blank, I don't know it that's just me as well; TLS 1.1 worked properly.[url=http://meincmagazine.com/civis/viewtopic.php?p=27776483#p27776483:3cef2pgk said:leedo[/url]":3cef2pgk]Some might consider this a feature[url=http://meincmagazine.com/civis/viewtopic.php?p=27774687#p27774687:3cef2pgk said:Decoherent[/url]":3cef2pgk]It's worth noting that Ars Technica itself doesn't work unless you allow TLS 1.0, which is irritating, because I can't move my minimum security settings up above that for the internet in general.Have you tried using a different browser?
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773477#p27773477:mbz3a9j5 said:ChrisSD[/url]":mbz3a9j5]I'm glad it's a simple fix for users of modern web browsers. For Firefox you just install the addon, nothing simpler. Unfortunately most users won't know to do this (presumably) and so will be vulnerable until November, assuming they do upgrade then.
Ah, I see. Misread your original comment. I'll double check our config.[url=http://meincmagazine.com/civis/viewtopic.php?p=27776803#p27776803:xuzz3oy9 said:Decoherent[/url]":xuzz3oy9]My apologies, this morning when I had Firefox set to TLS 1.2 only, I was getting a broken page. Now, however, it's working. I did test IE 11 as well; with TLS 1.2 the login box on the front page was blank, I don't know it that's just me as well; TLS 1.1 worked properly.[url=http://meincmagazine.com/civis/viewtopic.php?p=27776483#p27776483:xuzz3oy9 said:leedo[/url]":xuzz3oy9]Some might consider this a feature[url=http://meincmagazine.com/civis/viewtopic.php?p=27774687#p27774687:xuzz3oy9 said:Decoherent[/url]":xuzz3oy9]It's worth noting that Ars Technica itself doesn't work unless you allow TLS 1.0, which is irritating, because I can't move my minimum security settings up above that for the internet in general.Have you tried using a different browser?
EDIT- and now it's broken againI'll take this to the proper forum, sorry.
So, this "new" attack uses a known flaw?SSLv3, unlike TLS 1.0 or newer, omits validation of certain pieces of data that accompany each message. Attackers can use this weakness to decipher an individual byte and time of the encrypted data, and in so doing, extract the plain text of the message byte by byte.
[url=http://meincmagazine.com/civis/viewtopic.php?p=27774001#p27774001:zrxm0no2 said:igor.levicki[/url]":zrxm0no2]To do a quick check of your servers using openssl:
While you are at it, also check if SSLv2 is disabled:Code:openssl s_client -connect server.example.org:443 -ssl3
If you get an error then it is disabled, if you can see the output from the server such as certificates and cipher lists then it is enabled and you need to disable it along with any weak CBC based ciphers (such as DES and RC4), and weak hashes (such as MD5).Code:openssl s_client -connect server.example.org:443 -ssl2
[url=http://meincmagazine.com/civis/viewtopic.php?p=27774615#p27774615:h24pjoue said:CaptainTightpants[/url]":h24pjoue][url=http://meincmagazine.com/civis/viewtopic.php?p=27774477#p27774477:h24pjoue said:Knoware[/url]":h24pjoue]I went to the Mozilla page linked in the article and looked at the Add-On and attempted to install it, Firefox warns me the Author isn't verified and tells me I shouldn't trust it!
I'm no security expert either and when I see that nice lock icon and the "Mozilla.org certified" stamp, it really makes me wonder...
To be clearer. This is the link in the Mozilla page that the articled linked to that gives me the warning:
https://addons.mozilla.org/en-US/firefo ... n-control/
Yeah, noticed that myself and followed the about:config instructions mentioned in another post instead. Also fixes Android Firefox (where the extension apparently won't install according to another comment).
SHA1 certs can't be renewed past 12/31/2016, we recently renewed our wildcard cert and since the expiry was in 2017 it was issued as SHA2, we had to have them generate a copy as SHA1 as Citric Secure Gateway can't deal with SHA2 but it's set to expire before the main cert.[url=http://meincmagazine.com/civis/viewtopic.php?p=27780695#p27780695:2p3z1zji said:dooferorg[/url]":2p3z1zji]As well as SSL3 needing to go there's the phasing out of SHA1 too.
Certificates will likely need to be re-signed and webservers reconfigured soon.
Yea, this is one reason why I have been mentioning the need to update to XP SP3 too.[url=http://meincmagazine.com/civis/viewtopic.php?p=27780695#p27780695:3iro6xdj said:dooferorg[/url]":3iro6xdj]As well as SSL3 needing to go there's the phasing out of SHA1 too.
Certificates will likely need to be re-signed and webservers reconfigured soon.
No. It supports TLS...[url=http://meincmagazine.com/civis/viewtopic.php?p=27781691#p27781691:3bggc3sq said:pseudoname[/url]":3bggc3sq]I think you buried the lead: we may finally have an opportunity to burninate IE6!
Unless you have a very specific customer requirement, why does it bother you anyway? Surely you aren't still testing for IE6 compatibility, almost nobody outside of China has been using it for years.[url=http://meincmagazine.com/civis/viewtopic.php?p=27781691#p27781691:2yp5s2tl said:pseudoname[/url]":2yp5s2tl]I think you buried the lead: we may finally have an opportunity to burninate IE6!