More than 13 million HTTPS websites imperiled by new decryption attack

  • 1 March 2016
  • 8 replies
  • 399 views

Userlevel 7
Badge +54

Low-cost DROWN attack decrypts data in hours, works against TLS e-mail servers, too.

by Dan Goodin - Mar 1, 2016
 
                                 http://cdn.arstechnica.net/wp-content/uploads/2016/02/drown-attack-640x507.png
 
More than 13 million websites and e-mail services protected by the transport layer security protocol are vulnerable to a newly discovered, low-cost attack that decrypts sensitive communications in a matter of hours and in some cases almost immediately, an international team of researchers warned Tuesday. More than 97,000 of the top 1 million most popular Web properties are among the vulnerable HTTPS-protected sites.
 
The attack works against TLS-protected communications that rely on the RSA cryptosystem when the key is exposed even indirectly through SSLv2, a TLS precursor that was retired almost two decades ago because of crippling weaknesses. The vulnerability allows an attacker to decrypt an intercepted TLS connection by repeatedly using SSLv2 to make connections to a server. In the process, the attacker learns a few bits of information about the encryption key each time. While many security experts believed the removal of SSLv2 support from browser and e-mail clients prevented abuse of the legacy protocol, some misconfigured TLS implementations still tacitly support the legacy protocol when an end-user computer specifically requests its use. The most notable implementation subject to such fatal misconfigurations is the OpenSSL cryptographic library, which on Tuesday is expected to release an update that makes such settings much less likely to occur.
 
Full Article

8 replies

Userlevel 7
What is important is this new decryption attack has been discovered...now it has to be plugged up.
Userlevel 7
Badge +54
1 March 2016
By: Graham Cluley

 
Now that details of the attack are public it wouldn’t be a surprise if malicious actors attempt to exploit it in the wild. No doubt there will also be some security researchers who will be curious to experiment with it too…
 
The bad news for users is that there is nothing they should be doing to expedite a fix, other than put pressure on companies (the DROWN attack page lists major sites that are vulnerable such as Yahoo, BuzzFeed, Flickr, Samsung, Alibaba and Weibo) that they should disable SSLv2, and ensure that private keys are not used anywhere with server software that allows SSLv2 connections.
 
If you want to check whether a particular site is vulnerable, the researchers have helpfully provided an online tool.
 
Full Article
Badge +1
Webroot was one of them.
 

Userlevel 7
Very interesting...but I am sure that the good people over at Webroot are aware of this and have it covered...;)
Userlevel 7
Badge +56
Yep, we're working on it.
Userlevel 7
I had no doubt, Nic...really, I did! 
 
Thanks for the heads up. ;)
Userlevel 7
Badge +54
Thank you Nic, I knew Webroot would not be long in getting stuck into it.
Userlevel 7
Badge +54
By Eduard Kovacs on March 01, 2016 The OpenSSL Project has released updates to patch several vulnerabilities in the crypto library, including a high severity TLS issue that can be exploited to crack encrypted communications and steal potentially sensitive data.

A team of researchers has published a paper on “DROWN” (Decrypting RSA with Obsolete and Weakened eNcryption), a cross-protocol attack method that involves SSLv2, an old version of the protocol that is still supported by many servers.

The vulnerability, tracked as CVE-2016-0800, is believed to affect a quarter of the top one million HTTPS domains and one-third of all HTTPS websites. Full Article

Reply