{"id":77074,"date":"2015-05-26T22:00:53","date_gmt":"2015-05-27T02:00:53","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-08-25T12:41:59","modified_gmt":"2022-08-25T16:41:59","slug":"another-hole-in-internet-armor","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/another-hole-in-internet-armor\/","title":{"rendered":"Another Hole in Internet Armor"},"content":{"rendered":"<p><a href=\"http:\/\/loricarrassociates.com\/mend-the-holes-in-your-leaky-bucket-10-best-practices-for-higher-customer-retention\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-105980\" title=\"Another Hole in Internet Armor\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/leaky_bucket-e1569369793468-150x115.jpg?resize=130%2C100&#038;ssl=1\" alt=\"Another Hole in Internet Armor\" width=\"130\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/leaky_bucket-e1569369793468.jpg?resize=150%2C115&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/leaky_bucket-e1569369793468.jpg?resize=75%2C58&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/leaky_bucket-e1569369793468.jpg?w=263&amp;ssl=1 263w\" sizes=\"auto, (max-width: 130px) 100vw, 130px\" \/><\/a>Another <strong>hole<\/strong>\u00a0in our Internet armor has been discovered. The hole is in the\u00a0<strong><a class=\"zem_slink\" title=\"Diffie\u2013Hellman key exchange\" href=\"http:\/\/en.wikipedia.org\/wiki\/Diffie%E2%80%93Hellman_key_exchange\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">Diffie-Hellman key exchange<\/a><\/strong>,\u00a0a popular <strong>cryptographic<\/strong> algorithm that allows Internet protocols to agree on a shared key and negotiate a secure connection. It is fundamental to many protocols including <strong><a href=\"https:\/\/www.eff.org\/https-everywhere\" target=\"_blank\" rel=\"noopener noreferrer\">HTTPS<\/a>, <a class=\"zem_slink\" title=\"Secure Shell\" href=\"http:\/\/en.wikipedia.org\/wiki\/Secure_Shell\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">SSH<\/a>, <a class=\"zem_slink\" title=\"IPsec\" href=\"http:\/\/en.wikipedia.org\/wiki\/IPsec\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">IPsec<\/a><\/strong>, <a href=\"http:\/\/en.wikipedia.org\/wiki\/SMTPS\" target=\"_blank\" rel=\"noopener noreferrer\">SMTPS<\/a>, and protocols that rely on <strong><a class=\"zem_slink\" title=\"Transport Layer Security\" href=\"http:\/\/en.wikipedia.org\/wiki\/Transport_Layer_Security\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">TLS<\/a><\/strong>.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20160502210404\/http:\/\/scapeprivacy.com\/tag\/encryption\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105988 size-thumbnail\" title=\"Diffie-Hellman key exchange\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encryption-1.png?resize=71%2C75&#038;ssl=1\" alt=\"Diffie-Hellman key exchange\" width=\"71\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encryption-1.png?resize=71%2C75&amp;ssl=1 71w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encryption-1.png?resize=143%2C150&amp;ssl=1 143w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encryption-1.png?w=285&amp;ssl=1 285w\" sizes=\"auto, (max-width: 71px) 100vw, 71px\" \/><\/a><a href=\"https:\/\/www.eecs.umich.edu\/eecs\/faculty\/eecsfaculty.html?uniqname=jhalderm\" target=\"_blank\" rel=\"noopener noreferrer\">Researchers<\/a> from the <a href=\"https:\/\/www.umich.edu\" target=\"_blank\" rel=\"noopener noreferrer\">University of Michigan<\/a>, <a href=\"https:\/\/www.inria.fr\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Inria<\/a>, <a href=\"http:\/\/research.microsoft.com\/en-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Research<\/a>,<a href=\"https:\/\/www.jhu.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Johns Hopkins University<\/a>, and the <a href=\"http:\/\/www.upenn.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">University of Pennsylvania<\/a> have <a href=\"https:\/\/weakdh.org\/imperfect-forward-secrecy.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">uncovered several <strong>weaknesses<\/strong><\/a> in how <strong>Diffie-Hellman<\/strong> key exchange has been deployed. In what they are calling the <strong>Logjam attack<\/strong> the DF flaw allows a man-in-the-middle attacker to downgrade vulnerable TLS connections to <strong>512-bit export-grade cryptography<\/strong>. This allows the attacker to read and change any data passed over the connection.<\/p>\n<p>The problem, according to the researchers, is that millions of HTTPS, SSH, and VPN <strong>servers all use the same prime numbers<\/strong> for Diffie-Hellman key exchange. Practitioners believed this was safe as long as new key exchange messages were generated for every connection. However, the first step in the number field sieve\u2014the most efficient algorithm for breaking a Diffie-Hellman connection\u2014is dependent only on this prime. After this first step, <strong>an attacker can quickly break individual connections<\/strong>.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20150902031540\/http:\/\/www.shipsntripstravel.com:80\/different-prime-number-method\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105990\" title=\"prime number\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/prime-numbers-1.jpg?resize=120%2C67&#038;ssl=1\" alt=\"prime number\" width=\"120\" height=\"67\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/prime-numbers-1.jpg?resize=75%2C42&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/prime-numbers-1.jpg?resize=150%2C84&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/prime-numbers-1.jpg?w=446&amp;ssl=1 446w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a>To prove this hypothesis, the researchers carried out this computation against the most common 512-bit prime number used for TLS and demonstrated that the Logjam attack can be used to downgrade connections to 80% of TLS servers supporting DHEEXPORT.<\/p>\n<p>They also estimated that an academic team can break a 768-bit prime and that a nation-state can break a 1024-bit prime. Breaking the single, most common 1024-bit prime used by web servers would allow passive eavesdropping on connections to 18% of the Top 1 Million HTTPS domains.\u00a0A second prime would allow passive decryption of connections to 66% of VPN servers and 26% of SSH servers.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105991 size-medium\" title=\"VPN attack\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/vpn_attack-3.png?resize=150%2C96&#038;ssl=1\" alt=\"VPN attack\" width=\"150\" height=\"96\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/vpn_attack-3.png?resize=150%2C96&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/vpn_attack-3.png?resize=75%2C48&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/vpn_attack-3.png?w=171&amp;ssl=1 171w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>There is speculation that this &#8220;flaw&#8221; was being <strong>exploited by nation-state bad actors<\/strong>. A close reading of published NSA leaks shows that the agency&#8217;s attacks on <a class=\"zem_slink\" title=\"Virtual private network\" href=\"http:\/\/en.wikipedia.org\/wiki\/Virtual_private_network\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">VPNs<\/a> are consistent with having created, exploited, harnessed the Logjam vulnerability.<\/p>\n<p>What should you do?<\/p>\n<p>1 &#8211; Go to the <strong>researcher&#8217;s website <\/strong><strong><a href=\"https:\/\/weakdh.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/weakdh.org\/<\/a><\/strong>\u00a0to see if your browser is secure from the Logjam flaw. (<em>It reported that Google Chrome\u00a0Version 43.0.2357.81 (64-bit) on OSX 10.10.3 was not secure<\/em>}<\/p>\n<p>2 &#8211;\u00a0<strong><a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.google.com\/finance?cid=358464\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) patched<\/strong> the Logjam flaw on May 12 with security bulletin <a href=\"https:\/\/technet.microsoft.com\/library\/security\/MS15-055\">MS15-055<\/a>. A Microsoft spokesperson told <em><a href=\"https:\/\/www.eweek.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">eWEEK;<\/a> <\/em><\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>Customers who apply the update, or have automatic updates enabled, will be protected.\u00a0We encourage all customers to apply the update to help stay protected.<\/em><\/p>\n<p>3 &#8211;\u00a0<strong><a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) fixed<\/strong> the issue with the Chrome 42 update, which <a href=\"https:\/\/web.archive.org\/web\/20201108211600\/https:\/\/www.esecurityplanet.com\/browser-security\/google-chrome-42-gets-galactic-security-update.html\">debuted<\/a> on April 15. Google engineer Adam Langley <a href=\"https:\/\/groups.google.com\/a\/chromium.org\/forum\/#%21topic\/security-dev\/WyGIpevBV1s\">wrote<\/a>;<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>We disabled TLS False-Start with\u00a0Diffie-Hellman (DHE) in Chrome 42, which has been the stable version for many weeks now.<\/em><\/p>\n<p><a href=\"http:\/\/league-of-redheads.melissapohl.com\/facts.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105993 size-thumbnail\" title=\"patch for Firefox\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/band-aid-1.png?resize=75%2C75&#038;ssl=1\" alt=\"patch for Firefox\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/band-aid-1.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/band-aid-1.png?resize=150%2C148&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/band-aid-1.png?w=566&amp;ssl=1 566w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>4 &#8211; <strong>Mozilla&#8217;s patch for Firefox isn&#8217;t out yet<\/strong>, but &#8220;we expect it to be published in the next few days,&#8221; Richard Barnes, cryptographic engineering manager at Mozilla, told <em>eWEEK<\/em>.<\/p>\n<p><em>5 &#8211;\u00a0<a href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">DarkReading<\/a><\/em> reports that on the server-side, organizations such as <strong><a href=\"http:\/\/httpd.apache.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apache<\/a>, <a title=\"Oracle\" href=\"https:\/\/www.oracle.com\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Oracle<\/a> (<a title=\"NASDAQ : ORCL\" href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-ORCL\/\" target=\"_blank\" rel=\"noopener noreferrer\">ORCL<\/a>),\u00a0<a title=\"IBM\" href=\"http:\/\/www.ibm.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">IBM<\/a> (<a title=\"NYSE : IBM\" href=\"https:\/\/www.nyse.com\/quote\/XNYS:IBM\" target=\"_blank\" rel=\"noopener noreferrer\">IBM<\/a>),\u00a0<a href=\"http:\/\/www.cisco.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-CSCO\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSCO<\/a><\/strong><strong>)<\/strong>, and various hosting providers have been informed of the issue. There has been <strong>no response<\/strong> from these tech titans.<\/p>\n<p>The researchers have also provided guidance:<\/p>\n<ol>\n<li>If you have a <strong>web or mail server<\/strong>, they recommend \u00a0&#8211;\u00a0<strong>disable support for export cipher suites<\/strong> and generate a unique 2048-bit Diffie-Hellman group. They\u00a0have published a <a href=\"https:\/\/weakdh.org\/sysadmin.html\" target=\"_blank\" rel=\"noopener noreferrer\">Guide to Deploying Diffie-Hellman for TLS<\/a> with step-by-step instructions.<\/li>\n<li>If you use <strong>SSH<\/strong>, you should <strong>upgrade both your server and client installations<\/strong> to the most recent version of <a class=\"zem_slink\" title=\"OpenSSH\" href=\"http:\/\/www.openssh.com\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">OpenSSH<\/a>, which prefers the Elliptic-Curve Diffie-Hellman Key Exchange.<\/li>\n<li>If you\u2019re a sysadmin or developer, make sure any <strong>TLS libraries you use are up-to-date<\/strong>, that servers you support <strong>use 2048-bit or larger primes<\/strong>, and that clients you maintain reject Diffie-Hellman primes smaller than 1024-bit.<\/li>\n<\/ol>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Finally, get involved. Write someone, your representative, senator, your favorite bureaucrat, the president, your candidate, and tell them to get out of the way.\u00a0<\/em><\/p>\n<p><em>Ars Technica <a href=\"http:\/\/arstechnica.com\/security\/2015\/05\/https-crippling-attack-threatens-tens-of-thousands-of-web-and-mail-servers\/\">notes<\/a> that Logjam is partly caused by export restrictions put in place by the US government in the 1990s, to allow government agencies the ability to break the encryption used in other countries. &#8220;Logjam shows us once again why it&#8217;s a terrible idea to deliberately weaken cryptography, as the <a href=\"http:\/\/www.macnn.com\/articles\/14\/10\/22\/comey.seeking.update.to.calea.to.give.law.enforcement.a.front.door.into.devices\/\">FBI<\/a> and some in law enforcement are now <a href=\"http:\/\/www.macnn.com\/articles\/14\/10\/17\/encryption.of.smartphones.hampers.security.efforts.claims.fbi.head\/\">calling for<\/a>,&#8221; said Michigan&#8217;s\u00a0J. Alex Halderman to the report. &#8220;Today that backdoor is wide open.&#8221;<\/em><\/p>\n<p>&nbsp;<\/p>\n<h6 class=\"zemanta-related-title\">Related articles<\/h6>\n<ul class=\"zemanta-article-ul\">\n<li class=\"zemanta-article-ul-li\"><a href=\"http:\/\/wccftech.com\/new-critical-encryption-bug-logjam-discovered-to-infect-https-browsers\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Critical Encryption Bug Affecting Millions Might Have Enabled NSA&#8217;s Attack on VPNs<\/a> (wccftech.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thousands of internet servers are at risk due to using the same prime number in Diffie-Hellman and federal regs.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,420,101,247,487,2447,824,286,43,822,2450,421,2451,2445,4,2446,2165,2449,583,642,2448,579],"class_list":["post-77074","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-aapl","tag-apple","tag-cisco","tag-csco","tag-diffie-hellman-key-exchange","tag-encryption","tag-https","tag-ibm","tag-ipsec","tag-mitm","tag-msft","tag-nicrosoft","tag-openssh","tag-security","tag-smtps","tag-ssh","tag-threat","tag-tls","tag-university-of-michigan","tag-vpn","tag-wi-fi-2"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=77074"}],"version-history":[{"count":16,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77074\/revisions"}],"predecessor-version":[{"id":132938,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77074\/revisions\/132938"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=77074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=77074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=77074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}