由买买提看人间百态

boards

本页内容为未名空间相应帖子的节选和存档,一周内的贴子最多显示50字,超过一周显示500字 访问原贴
USANews版 - 5/20发现的一个网络加密的漏洞,大家赶紧fix一下
相关主题
纽约 骑Citi Bike的抢劫犯 专门抢亚裔jeb又把他哥请出来了
美国可肆意掐断他国网络,中国能否抵抗此劫联邦法院判决德州投票不准查ID
许多政府网站即将关闭关于trump对待Russia 的很中肯的分析,媒体太evil
白人奴隶主和黑人奴隶的后代同席而坐芝加哥市长:就要包庇非法移民
New Weapon Deployed in AfghanistanBlack Rifle Coffee将雇佣10000退伍老兵
Inappropriate Obama尼玛 Trump入侵索马里
传播正能量,老黑教子 (转载)三胖牛逼,美国派出了第三艘航空母舰 (转载)
Trump团队招募志愿者,信息见内容马恳关于军队变性人的声明
相关话题的讨论汇总
话题: hellman话题: diffie话题: tls话题: logjam话题: bit
进入USANews版参与讨论
1 (共1页)
l****z
发帖数: 29846
1
这里现讲怎么fix.
IE已经fix了.
用最新版firefox V38.01的可以很简单的fix.
Chrome和其他的不知道. 因为我基本不用.
=====
jscher2000 wrote:
Disable the insecure ciphers here:
(1) In a new tab, type or paste about:config in the address bar and press
Enter. Click the button promising to be careful.
(2) In the search box above the list, type or paste ssl3 and pause while the
list is filtered
(3) Double-click the security.ssl3.dhe_rsa_aes_128_sha preference to switch
it from true to false (this usually would be the first item on the list)
(4) Double-click the security.ssl3.dhe_rsa_aes_256_sha preference to switch
it from true to false (this usually would be the second item on the list)
That's it, you can test using: https://www.ssllabs.com/ssltest/viewMyClient.
html
==========
weakdh.org
The Logjam Attack
Diffie-Hellman key exchange is a popular cryptographic algorithm that allows
Internet protocols to agree on a shared key and negotiate a secure
connection. It is fundamental to many protocols including HTTPS, SSH, IPsec,
SMTPS, and protocols that rely on TLS.
We have uncovered several weaknesses in how Diffie-Hellman key exchange has
been deployed:
Logjam attack against the TLS protocol. The Logjam attack allows a man-
in-the-middle attacker to downgrade vulnerable TLS connections to 512-bit
export-grade cryptography. This allows the attacker to read and modify any
data passed over the connection. The attack is reminiscent of the FREAK
attack, but is due to a flaw in the TLS protocol rather than an
implementation vulnerability, and attacks a Diffie-Hellman key exchange
rather than an RSA key exchange. The attack affects any server that supports
DHE_EXPORT ciphers, and affects all modern web browsers. 8.4% of the Top 1
Million domains were initially vulnerable.
Threats from state-level adversaries. Millions of HTTPS, SSH, and VPN
servers all use the same prime numbers for Diffie-Hellman key exchange.
Practitioners believed this was safe as long as new key exchange messages
were generated for every connection. However, the first step in the number
field sieve—the most efficient algorithm for breaking a Diffie-Hellman
connection—is dependent only on this prime. After this first step, an
attacker can quickly break individual connections.
We carried out this computation against the most common 512-bit prime
used for TLS and demonstrate that the Logjam attack can be used to downgrade
connections to 80% of TLS servers supporting DHE_EXPORT. We further
estimate that an academic team can break a 768-bit prime and that a nation-
state can break a 1024-bit prime. Breaking the single, most common 1024-bit
prime used by web servers would allow passive eavesdropping on connections
to 18% of the Top 1 Million HTTPS domains. A second prime would allow
passive decryption of connections to 66% of VPN servers and 26% of SSH
servers. A close reading of published NSA leaks shows that the agency's
attacks on VPNs are consistent with having achieved such a break.
More Information
We have published a technical report, Imperfect Forward Secrecy: How Diffie-
Hellman Fails in Practice, which has specifics on these attacks, details on
how we broke the most common 512-bit Diffie-Hellman group, and measurements
of who is affected.
We have also published a Logjam Server Test, Guide to Deploying Diffie-
Hellman for TLS, and several proof of concept demos.
This study was performed by computer scientists at CNRS, Inria Nancy-Grand
Est, Inria Paris-Rocquencourt, Microsoft Research, Johns Hopkins University,
University of Michigan, and the University of Pennsylvania: David Adrian,
Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J.
Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke
Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Beguelin, and
Paul Zimmermann. The team can be contacted at [email protected]
/* */
Who is affected?
Websites, mail servers, and other TLS-dependent services that support DHE_
EXPORT ciphers are at risk for the Logjam attack. We use Internet-wide
scanning to measure who is vulnerable.
Protocol Vulnerable to Logjam
HTTPS — Top 1 Million Domains 8.4%
HTTPS — Browser Trusted Sites 3.4%
SMTP+StartTLS — IPv4 Address Space 14.8%
POP3S — IPv4 Address Space 8.9%
IMAPS — IPv4 Address Space 8.4%
Websites that use one of a few commonly shared 1024-bit Diffie-Hellman
groups may be susceptible to passive eavesdropping from an attacker with
nation-state resources. Here, we show how various protocols would be
affected if a single 1024-bit group were broken in each protocol, assuming a
typical up-to-date client (e.g., most recent version of OpenSSH or up-to-
date installation of Chrome).
Vulnerable if most common 1024-bit group is broken
HTTPS — Top 1 Million Domains 17.9%
HTTPS — Browser Trusted Sites 6.6%
SSH — IPv4 Address Space 25.7%
IKEv1 (IPsec VPNs) — IPv4 Address Space 66.1%
What should I do?
If you run a server…
If you have a web or mail server, you should disable support for export
cipher suites and generate a unique 2048-bit Diffie-Hellman group. We have
published a Guide to Deploying Diffie-Hellman for TLS with step-by-step
instructions. If you use SSH, you should upgrade both your server and client
installations to the most recent version of OpenSSH, which prefers Elliptic
-Curve Diffie-Hellman Key Exchange.
If you use a browser…
Make sure you have the most recent version of your browser installed, and
check for updates frequently. Google Chrome (including Android Browser),
Mozilla Firefox, Microsoft Internet Explorer, and Apple Safari are all
deploying fixes for the Logjam attack.
If you’re a sysadmin or developer …
Make sure any TLS libraries you use are up-to-date, that servers you
maintain use 2048-bit or larger primes, and that clients you maintain reject
Diffie-Hellman primes smaller than 1024-bit.
These results were published on May 20, 2015.
1 (共1页)
进入USANews版参与讨论
相关主题
马恳关于军队变性人的声明New Weapon Deployed in Afghanistan
春天到了,非法移民开始越境了Inappropriate Obama
Texas 派兵响应trump了 (转载)传播正能量,老黑教子 (转载)
马蒂斯派兵,大篷车暂停Trump团队招募志愿者,信息见内容
纽约 骑Citi Bike的抢劫犯 专门抢亚裔jeb又把他哥请出来了
美国可肆意掐断他国网络,中国能否抵抗此劫联邦法院判决德州投票不准查ID
许多政府网站即将关闭关于trump对待Russia 的很中肯的分析,媒体太evil
白人奴隶主和黑人奴隶的后代同席而坐芝加哥市长:就要包庇非法移民
相关话题的讨论汇总
话题: hellman话题: diffie话题: tls话题: logjam话题: bit