{"id":75900,"date":"2015-03-12T22:59:13","date_gmt":"2015-03-13T02:59:13","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-12T21:24:19","modified_gmt":"2021-08-13T01:24:19","slug":"what-the-freak","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/what-the-freak\/","title":{"rendered":"What the FREAK !"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20190906115656\/http:\/\/www.security-faqs.com:80\/why-do-certain-countries-ban-encryption-software.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-102299\" title=\"What the FREAK !\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypted_key-e1567201930583-150x84.jpg?resize=126%2C70&#038;ssl=1\" alt=\"What the FREAK !\" width=\"126\" height=\"70\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypted_key-e1567201930583.jpg?resize=150%2C84&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypted_key-e1567201930583.jpg?resize=75%2C42&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypted_key-e1567201930583.jpg?w=255&amp;ssl=1 255w\" sizes=\"auto, (max-width: 126px) 100vw, 126px\" \/><\/a>Earlier this month news broke that Google, Apple, and Microsoft are <strong>vulnerable to a new bug<\/strong> poetically called \u2013 Factoring RSA Export Keys \u2013 <strong>FREAK<\/strong>. The cause of the FREAK bug is not new. In fact, the origin of the FREAK back goes back to the 1990s and government meddling.<\/p>\n<p><a href=\"https:\/\/www.getcloudservices.com\/blog\/data-encryption-and-its-significance\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102301\" title=\"weaker HTTPS encryption\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_encryption1-e1567201597205-150x114.jpg?resize=100%2C76&#038;ssl=1\" alt=\"weaker HTTPS encryption\" width=\"100\" height=\"76\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_encryption1-e1567201597205.jpg?resize=150%2C114&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_encryption1-e1567201597205.jpg?resize=75%2C57&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_encryption1-e1567201597205.jpg?w=222&amp;ssl=1 222w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a><a title=\"Paul Dirkin\" href=\"https:\/\/nakedsecurity.sophos.com\/author\/pducklin\/\" target=\"_blank\" rel=\"noopener noreferrer\">Paul Dirkin<\/a> at <a title=\"Sophos\" href=\"http:\/\/www.sophos.com\/en-us.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos&#8217;<\/a> <em><a title=\"Naked Security\" href=\"https:\/\/nakedsecurity.sophos.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Naked Security<\/a><\/em> blog <a title=\"The FREAK bug in TLS\/SSL - what you need to know\" href=\"https:\/\/nakedsecurity.sophos.com\/2015\/03\/04\/the-freak-bug-in-tlsssl-what-you-need-to-know\/\" target=\"_blank\" rel=\"noopener noreferrer\">explains<\/a> that <strong>FREAK<\/strong> is a risk to all users. It is a risk because an attacker can trick you and the server into settling on a <strong>much weaker HTTPS encryption<\/strong> scheme than from the 1990s. Basically, the attacker gets you to use what&#8217;s called &#8220;<strong>export grade&#8221; <a title=\"RSA (algorithm)\" href=\"http:\/\/en.wikipedia.org\/wiki\/RSA_%28algorithm%29\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">RSA encryption<\/a>. <\/strong>Export grade encryption is\u00a0a ghost from an earlier <strong>U.S. Gooberment<\/strong> attempt to break encryption. In the &#8217;90s the NSA required exported encryption to be deliberately weakened. The idea was that export grade keys were just about good enough for every day, not-so-secret use, but could be cracked by superpowers with supercomputers if national security should demand it.<\/p>\n<p>No one should be using export-grade keys anymore \u2013 indeed, no one usually does. But many clients and servers still support them according to Sophos. Somehow, in 2015 it never seemed to matter that the 1990 code was still lying around.<\/p>\n<p><a href=\"https:\/\/christinenataliewhite.wordpress.com\/category\/humor\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102303\" title=\"U.S. Gooberment attempt to break encryption\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/politician-e1567201722425-121x150.jpg?resize=81%2C100&#038;ssl=1\" alt=\"U.S. Gooberment attempt to break encryption\" width=\"81\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/politician-e1567201722425.jpg?resize=121%2C150&amp;ssl=1 121w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/politician-e1567201722425.jpg?resize=60%2C75&amp;ssl=1 60w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/politician-e1567201722425.jpg?w=477&amp;ssl=1 477w\" sizes=\"auto, (max-width: 81px) 100vw, 81px\" \/><\/a>If attackers can watch the traffic flowing between vulnerable devices and websites they could <strong>inject code<\/strong> that forces both sides to use 512-bit encryption, which can be easily cracked. It took researchers seven months to crack the key In 1999, the article claims that the same crack takes about 12 hours and $100 using <a title=\"Amazon\" href=\"http:\/\/www.amazon.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon&#8217;s<\/a> (<a title=\"NASDAQ : AMZN\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AMZN\/\" target=\"_blank\" rel=\"noopener noreferrer\">AMZN<\/a>) cloud in 2015. It would then be technically pretty straightforward to launch a <a href=\"https:\/\/www.techopedia.com\/definition\/4018\/man-in-the-middle-attack-mitm\" target=\"_blank\" rel=\"noopener noreferrer\">MITM<\/a> by pretending to be the official website.<\/p>\n<p>Now that your security is compromised, an attacker can use a &#8220;man in the middle&#8221; attack (someone who can listen into and change the network traffic between you and your destination server).<\/p>\n<p><a href=\"http:\/\/www.bytefusion.com\/products\/ens\/secexmail\/linux\/rsapublickeyencryption.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102305\" title=\"Factoring\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/smart_guy_teaching-e1567201798424-129x150.gif?resize=86%2C100&#038;ssl=1\" alt=\"Factoring\" width=\"86\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/smart_guy_teaching-e1567201798424.gif?resize=129%2C150&amp;ssl=1 129w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/smart_guy_teaching-e1567201798424.gif?resize=65%2C75&amp;ssl=1 65w\" sizes=\"auto, (max-width: 86px) 100vw, 86px\" \/><\/a>Additionally, the author says many servers use the same RSA key over and over again. This allows attackers to use the compromised export grade key to decrypt other sessions, using the same key. Another risk Sophos claims is that export-grade keys allow evil-doers to steal both the public and private keys by using a technique known as &#8220;factoring the modulus,&#8221;\u00a0 With the critical private key, criminals can now sign traffic from an imposter website as though it came from a trusted third-party.<\/p>\n<p>The author says the team that identified the original FREAK vulnerability claim to have used this bug to create a fake nsa dot gov.\u00a0<a title=\"University of Michigan\" href=\"http:\/\/umich.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">University of Michigan<\/a> <a title=\"University of Michigan\" href=\"https:\/\/web.archive.org\/web\/20171021143634\/http:\/\/cs.lsa.umich.edu:80\/\" target=\"_blank\" rel=\"noopener noreferrer\">computer scientists<\/a> J. Alex Halderman and Zakir Durumeric, told <em><a title=\"FREAK Show Rocks Security Industry \" href=\"http:\/\/www.infosecurity-magazine.com\/news\/freak-show-rocks-security-industry\/\" target=\"_blank\" rel=\"noopener noreferrer\">InfoSecurity<\/a><\/em> that the vulnerability affects around 36% of all sites trusted by browsers and around 10% of the Alexa top one million domains.<\/p>\n<p>The good news, according to Sophos: Users of <strong>Chromium\/Chrome and Firefox are OK.<\/strong><\/p>\n<p>The bad news &#8211; the bug affects TLS\/SSL, the security protocol that puts the S into HTTPS and is responsible for the padlock in your browser&#8217;s address bar. <strong>The bug<\/strong> is known to exist in:<\/p>\n<ul>\n<li><strong><a title=\"OpenSSL\" href=\"http:\/\/www.openssl.org\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">OpenSSL<\/a>&#8216;s TLS<\/strong> implementation (before version 1.0.1k), which includes <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) <strong>Android<\/strong>&#8216;s &#8220;Browser&#8221; browser, and therefore probably\u00a0<a title=\"Samsung Electronics Co.\" href=\"http:\/\/www.samsung.com\/us\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Samsung<\/strong>&#8216;s<\/a> (<a title=\"KS : 005930\" href=\"http:\/\/www.bloomberg.com\/quote\/005930:KS\" target=\"_blank\" rel=\"noopener noreferrer\">005930<\/a>) derived browser known as &#8220;Internet.&#8221;<\/li>\n<li><strong><a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a><\/strong> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>)\u00a0SecureTransport puts OS X software at risk, including <strong>Safari<\/strong>.<\/li>\n<li><strong><a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a><\/strong> (<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.google.com\/finance?cid=358464\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>)\u00a0Windows Schannel TLS library puts Windows software including <strong>Internet Explorer<\/strong> at risk.<\/li>\n<\/ul>\n<p>You can <strong>check to see if your browser is vulnerable<\/strong> to the FREAK attack on a <strong><a title=\"University of Michigan\" href=\"http:\/\/maps.google.com\/maps?ll=42.283,-83.735&amp;spn=0.01,0.01&amp;q=42.283,-83.735 (University%20of%20Michigan)&amp;t=h\" target=\"_blank\" rel=\"geolocation nofollow noopener noreferrer\">UMich<\/a> page <a title=\"FREAK Attack: Client Check\" href=\"https:\/\/freakattack.com\/clienttest.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a><\/strong>.<\/p>\n<p>You can also check on your favorite <strong>website on this <a title=\"U-M ranked 19th-best university in the world by Time Higher Education\" href=\"http:\/\/www.mlive.com\/news\/ann-arbor\/index.ssf\/2015\/03\/u-m_ranked_19th-best_universit.html#incart_river\" target=\"_blank\" rel=\"noopener noreferrer\">UMich<\/a> <a title=\"Tracking the FREAK Attack\" href=\"https:\/\/freakattack.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">page. <\/a><\/strong><\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>&#8220;Export grade&#8221; encryption was largely abandoned by 2000 because it was a bad idea. silly idea. It hurt the US software industry and Americans who bought an inferior product. It is still a dumb idea in 2015. As the Gooberment wants to cripple the latest generation of encryption by <a title=\"Obama Wants Tech Companies to Install Backdoors for Government Spying\" href=\"http:\/\/www.slate.com\/blogs\/future_tense\/2015\/01\/19\/obama_wants_backdoors_in_encrypted_messaging_to_allow_government_spying.html\" target=\"_blank\" rel=\"noopener noreferrer\">putting backdoors<\/a> into encrypted messaging. They seem to have won with Google. Google has <a title=\"Google reverses its promise to enable encryption by default in Android Lollipop\" href=\"http:\/\/www.zdnet.com\/article\/android-lollipop-may-support-encryption-like-ios-8-but-only-google-nexus-devices-get-it-by-default\/\" target=\"_blank\" rel=\"noopener noreferrer\">dumped plans to encrypt<\/a>\u00a0communications by default in Android.<\/em><\/p>\n<p><em>In the short term, if you are worried, use another browser Firefox or Chrome.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20150516002216\/http:\/\/blogs.barrons.com\/techtraderdaily\/2015\/03\/11\/apples-app-stores-out-of-order\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Apple&#8217;s App Stores Out of Order<\/a> (blogs.barrons.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google, Apple, and Microsoft products are at risk of the FREAK attack from 25-year-old government-mandated export-grade code<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,420,101,824,2388,536,92,67,82,421,4,281,305,583,642],"class_list":["post-75900","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-aapl","tag-apple","tag-encryption","tag-freak","tag-goog","tag-google","tag-hack","tag-microsoft","tag-msft","tag-security","tag-sophos","tag-ssl","tag-tls","tag-university-of-michigan"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/75900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=75900"}],"version-history":[{"count":7,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/75900\/revisions"}],"predecessor-version":[{"id":126825,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/75900\/revisions\/126825"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=75900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=75900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=75900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}