MENU

HTTPS sites are threatened by a new low-cost decipher attack

Posted by Oksana Zybinskaya on March 7, 2016
Tags: , ,
Share on Facebook0Share on Google+0Share on LinkedIn0Share on Reddit0Tweet about this on Twitter0
5/5 (4)
5/54

TLS
A new low-cost attack that decrypts sensitive communications in neglectable time has been discovered recently. The attack works against TLS-protected communications using RSA cryptosystem which expose the key through SSLv2, which was retired two decades ago due to vulnerabilities, but still may be supported by some service due to legacy compatibility reasons or misconfigured TLS implementations.

non-protected_TLS

According to statistics, over 5.9 million Web-servers directly support SSLv2. Though, even when a server doesn’t allow SSLv2, it may still be susceptible to attack if the underlying RSA key pair is reused on a different server supporting the old protocol.
The researchers dubbed the latest vulnerability DROWN, short for Decrypting RSA with Obsolete and Weakened eNcryption. The most notable example of TLS implementation known so far to be vulnerable to DROWN is OpenSSL cryptolibrary, for which a new security patch was released recently.

This is the review of an article.

Source : arstechnica.com

Related materials:

Views All Time
1
Views Today
1

Please rate this

Return to all posts

Manage Nano Servers from Server Management Tools in Microsoft Azure
[AZURE] Execute an Azure Automation Runbook from an ASP.NET website
The following two tabs change content below.
Oksana Zybinskaya
Oksana Zybinskaya
PR-manager in StarWind. In touch with virtualization world, may know stuff you are interested in.