Caution! FREAK Vulnerabilities in OpenSSL and SecureTransport

FREAK out? Security researchers warn of new vulnerabilities in Apple's OpenSSL and SecureTransport that allow an attacker to decrypt your login cookies, as well as other sensitive information, from HTTPS connections if you use a vulnerable , such as Safari.freak encryption key

Το SecureTransport της Apple είναι μια βιβλιοθήκη που χρησιμοποιείται από τις εφαρμογές για iOS και OS X, όπως το Safari για , iPad και Mac. Το πρωτόκολλο OpenSSL είναι open source, και χρησιμοποιείται από προγράμματα περιήγησης του Android, και από πολλά άλλα.

Με τα πρωτόκολλα OpenSSL και SecureTransport πραγματοποιείται η κρυπτογράφηση σε συνδέσεις με , webmail, και άλλες ιστοσελίδες HTTPS.

"The connection is vulnerable if the server accepts RSA_EXPORT encryption and the client either offers an RSA_EXPORT suite or uses an OpenSSL version that is vulnerable to CVE-2015-0204 vulnerabilities," according to freakattack.com, a website that explains the flaw. security.

"Vulnerable clients have many Google and Apple devices that use unpatched OpenSSL, a large number of embedded systems, and many other software products that use TLS."

You can see if your browser is vulnerable to freakattack.com.

How did this happen?

In the early 1990s, the των ΗΠΑ απαγόρευσε την πώληση λογισμικού στο εξωτερικό, εκτός αν ο κώδικας που χρησιμοποιείται από τις λεγόμενες “σουίτες εξαγωγής κρυπτογράφησης” που περιείχε encryption is no longer 512 bits.

At that time, in order to ensure Uncle Sam, only relatively weak encryption was exported to the rest of the world, and he held the strongest for himself.

However, the limitations on cryptos exports no longer apply, but some implementations of TLS and SSL protocols continue to support these 1990 technology for the export of encryption code.

This last defect, which we report today and was named FREAK (Factoring RSA Export Keys), can be exploited during the creation of a secure connection when encryption has not yet started.

Vulnerable clients (such as a web browser, smartphone or internet-of-things) start talking on a server (like the machine behind an HTTPS webpage), and listing the encryption algorithms and key lengths supported.

An intruder can monitor traffic between the client and the server and can intervene by saying that the client only receives encryption-encryption keys, such as telling one of the old 512-bit RSA keys.

Because of the flaw in OpenSSL and SecureTransport, the server responds with a weak key, the client accepts it and the encryption process begins.

Hopefully they will release patches immediately.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).