Hackers break SSL encryption used by millions of sites

Discussion in 'other security issues & news' started by tlu, Sep 20, 2011.

Thread Status:
Not open for further replies.
  1. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    :thumb:

    @ Searching_ _ _

    Thanks for the http://news.ycombinator.com/item?id=3015498 link :thumb:

    *

    Wonder if this will help, Any ?

    Some good info here

     
  2. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    Thai Duong's Tweet for those interested in getting hold of the P.o.C.
     
  3. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    Some background info etc

     
  4. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    Nope you not, its coming to an ISP near you....LOL
     
  5. vasa1

    vasa1 Registered Member

    Joined:
    May 1, 2010
    Posts:
    4,417
  6. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Not to say I'm an expert but...

    injecting javascript is easy if you have control over any part of the connection ie: host or router. Assuming taht you're trying to attack them with beast we can safely say you're already in control of some part, such as being on a public connection

    And sending data from the browser to the remote site? All tehy have to do is click a link or visit the site they intend to go to! Not hard.
     
  7. vasa1

    vasa1 Registered Member

    Joined:
    May 1, 2010
    Posts:
    4,417
    One more thing seems to be the time required. If sites involving monetary transactions were lighter, we could get in and out faster.
    Instead, even such sites are subject to creativity :(
     
  8. tlu

    tlu Guest

    In this thread Giorgio Maone, the Noscript developer, says that he knows the details of the attack but he can't reveal them yet.

    Nevertheless he adds:

    That's good news since that means that Noscript is able to protect gainst this attack unless you've whitelisted the attacker's site.
     
  9. vasa1

    vasa1 Registered Member

    Joined:
    May 1, 2010
    Posts:
    4,417
    Attacker's site?
     
  10. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    I don't see why they need to be in control of something like your ISP. If it's a public network they should be able to change or add javascript. Most javascript on websites is not encrypted, even on HTTPS.
     
  11. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Doing bank transactions quickly isn't the best defense. Once this is optimized for Cuda it'll be nearly instant. The best defense is to force websites to update.
     
  12. vasa1

    vasa1 Registered Member

    Joined:
    May 1, 2010
    Posts:
    4,417
    I never implied it's the best defense.
     
  13. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    By "best defense" I actually mean "a (useful) defense at all."
     
  14. vasa1

    vasa1 Registered Member

    Joined:
    May 1, 2010
    Posts:
    4,417
    That's your opinion and you're welcome to it ;)
     
  15. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  16. tlu

    tlu Guest

  17. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    I'm on the dev build so I guess I'm already protected haha
     
  18. Escalader

    Escalader Registered Member

    Joined:
    Dec 12, 2005
    Posts:
    3,710
    Location:
    Land of the Mooses
    I'm sitting here looking at this thread and wondering is this all real?

    IOW does the average joe out there who knows sqaut about security (no not all you guys and gals) really need to worry?

    My guess is the answer is no, not if he has a reasonable set of tools in place put there no doubt by MR Geek (me) changes his psw'd and gets on with life.

    Security has a way of eating up your life if you let it.

    Go ahead and fire away! ( Im hiding behind a router hard wired);)
     
  19. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Nope, I'm not too worried about this at all.
     
  20. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    From tlu's link: http://www.theregister.co.uk/2011/09/21/google_chrome_patch_for_beast/

    No Firefox fix...o_O
     
  21. tlu

    tlu Guest

  22. elapsed

    elapsed Registered Member

    Joined:
    Apr 5, 2004
    Posts:
    7,076
    After some more research it appears that OpenSSL (I believe is currently the most commonly used crypto library) will support TLS 1.1 and 1.2 in its upcoming version OpenSSL 1.0.1, hopefully it will be adopted fast.

    Also after reading this page, it appears that TLS is actually meant to replace SSL3.

    With that in mind I have disabled SSL3, all the secure websites I browse work fine as they support (the superior) TLS 1.0

    tls.png
     
  23. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    I like this Chrome fix. Supporting 1.1 and 1.2 will be nice when it comes but it's useless for now since no websites ever use those (except government sites and a few odd others.)
     
  24. tlu

    tlu Guest

    I'm afraid that's not correct. From what I've read TLS 1.0 is actually a precondition that this attack works. Only version 1.1. and above are not attackable. The problem is that nearly all https connection are done via TLS 1.0 as only the development version 1.0.1 of OpenSSL supports TLS 1.1. Unfortunately, this version isn't used by most servers yet.
     
  25. elapsed

    elapsed Registered Member

    Joined:
    Apr 5, 2004
    Posts:
    7,076
    What? There's nothing incorrect or correct about it. I wasn't stating a fact, I was stating an action that I had taken. Did I state that this action prevents this exploit? No. The rest of your comment is repeating what I've already said.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.