HTTPS sites are threatened by a new low-cost decipher attack
A new low-cost attack that decrypts sensitive communications in neglectable time has been discovered recently. The attack works against TLS-protected communications using RSA cryptosystem which expose the key through SSLv2, which was retired two decades ago due to vulnerabilities, but still may be supported by some service due to legacy compatibility reasons or misconfigured TLS implementations.
According to statistics, over 5.9 million Web-servers directly support SSLv2. Though, even when a server doesn’t allow SSLv2, it may still be susceptible to attack if the underlying RSA key pair is reused on a different server supporting the old protocol.
The researchers dubbed the latest vulnerability DROWN, short for Decrypting RSA with Obsolete and Weakened eNcryption. The most notable example of TLS implementation known so far to be vulnerable to DROWN is OpenSSL cryptolibrary, for which a new security patch was released recently.
This is the review of an article.
Source : arstechnica.com
- Let’s Get Real About Data Protection and Disaster Recovery
- Virtual Volumes (VVols) backup – how it works and which solutions should be used
Latest posts by Oksana Zybinskaya (see all)
- Microsoft joins the Linux Foundation - November 22, 2016
- The unknown microwave networks - November 17, 2016
- Software Defined Networking (SDN) Stack in the Windows Server 2016 - November 3, 2016
- DoS attack on major DNS provider, Dyn, brings down Internet. Twitter, Reddit affected - October 24, 2016
- WD exposes new SanDisk drives: Blue and Green - October 19, 2016