LOGJAM and FREAK 101
A lot of fuss has been made recently over two new
vulnerabilities in TLS/SSL called FREAK and LOGJAM. As a matter of fact,
experts are so concerned about the new frequency of TLS/SSL vulnerabilities
(Poodle, Logjam, Freak, etc.) that industry standards are changing. The Payment Card Industry (PCI) oversight
group just issued PCI 3.1 out of cycle stating that, “The National Institute of
Standards and Technology (NIST) has identified the Secure Socket Layers (SSL)
v3.0 protocol as no longer being acceptable for protection of data due to
inherent weaknesses within the protocol.” They go on to mandate that, “Companies
have until June 30, 2016, to update to a more recent version of TLS. Prior to
this date, existing implementations using SSL and or early TLS must have a
formal risk mitigation and migration plan in place. Effective immediately, all
new implementations must not use SSL or early TLS.” In short, any business
software running SSL 2.0 or 3.0 must be reconfigured or upgraded. The new
standard appears to be TLS 1.2 and businesses are now left clamoring to upgrade
their software standards.
So what is FREAK and LOGJAM?
Well FREAK allows an attacker to sit on the network between a client and
a server in a Man-in-The-Middle (MiTM) attack, and the FREAK attack involves
trying to trick both ends into accepting what's called an export-grade cipher
instead of a proper one.
Clear as mud right? Ok, well let me explain. Export grade
ciphers were used in the 1990’s to export encrypted software to countries that
were “Not so Friendly” to the USA and her allies. They were abandoned because computing power
and cloud technologies had increased to a point where they were easily
crackable. The old TLS/SSL protocols never discontinued their support of the ciphers. We locked the car, but left the keys in the
ignition.
FREAK & LOGJAM both downgrade the ciphers to
export-grade and are subject to MiTM. In
Freak, the attacker changes client requests to the server from the normal RSA
encryption suite to request the export grade ciphers instead. LOGJAM is similar, but affects the
DIFFIE-HELLMAN (DHE) ciphers, and usually affects TLS protocol services on
servers and browsers.
Some advice for LOGJAM is to make sure you TLS libraries are up to date, use 2048 bits ciphers for DHE, and disable support for export grade ciphers on your web or mail servers. For Freak, several client OS and Browser updates/patches have been rolled out to help fix the problem. Remember to update your browsers, clients, and mobile devices.
Some advice for LOGJAM is to make sure you TLS libraries are up to date, use 2048 bits ciphers for DHE, and disable support for export grade ciphers on your web or mail servers. For Freak, several client OS and Browser updates/patches have been rolled out to help fix the problem. Remember to update your browsers, clients, and mobile devices.
Comments
Post a Comment