SSL/TLS Vulnerability Details to be Released Friday
I'm getting a lot of emails asking about articles that ultimately reference this upcoming talk: "BEAST: Surprising crypto attack against HTTPS" (http://ekoparty.org/2011/juliano-rizzo.php)
I don't have any extra details. Anything that I write now will be unnecessary speculation. It sounds like it will be interesting; their presentation last year on Padded Oracle Attacks (the crypto Oracle, not the database) certainly was.
UPDATE: Dr J links us to "A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE
CHOSEN-PLAINTEXT ATTACK ON SSL" that may describe the attack. This attack requires that the attacker be able to sniff the traffic and run code on the victims machine to inject the chosen-plaintext into the stream.
My recommendation is still to wait until we see the details before formulating a response, but sight-unseen the following steps couldn't hurt:
- Users: Don't bank using someone else's wifi.
- Browser Authors: Update to support TLS 1.2
- Servers Admins: Configure to support TLS 1.2
Comments
More info here:
https://threatpost.com/en_us/blogs/new-attack-breaks-confidentiality-model-ssl-allows-theft-encrypted-cookies-091611
http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
perox_
Sep 20th 2011
1 decade ago
-KL
Kevin
Sep 20th 2011
1 decade ago
jullrich@sans.edu
Sep 20th 2011
1 decade ago
RobM
Sep 20th 2011
1 decade ago
Kevin
Sep 20th 2011
1 decade ago
Bob Stangarone
Sep 20th 2011
1 decade ago
Confused
Sep 21st 2011
1 decade ago
Confused
Sep 21st 2011
1 decade ago
Essentially they do a MITM on your SSL traffic. So not breaking the protocol at all.
M
Mark
Sep 21st 2011
1 decade ago
This problem has been kept really quiet ... I wonder why
https://bugzilla.mozilla.org/show_bug.cgi?id=565047 – Implement TLS 1.1 (RFC 4346)
https://bugzilla.mozilla.org/show_bug.cgi?id=480514 – Implement support for TLS 1.2 (RFC 5246)
Paradiso
Sep 21st 2011
1 decade ago