~Toughbooktalk~ Rob - 630-300-8877

The largest Toughbook discussion site on the net!
It is currently Thu Nov 21, 2019 9:34 pm

All times are UTC-06:00




Post new topic  Reply to topic  [ 10 posts ] 
Author Message
PostPosted: Fri Oct 17, 2014 12:16 pm 
Offline
User avatar

Joined: Fri Feb 22, 2013 3:10 pm
Posts: 860
Location: Edmonton, Alberta
Got this notice a few minutes ago.

Code:
TA14-290A: SSL 3.0 Protocol Vulnerability and POODLE Attack
10/17/2014 12:27 PM EDT

Original release date: October 17, 2014
Systems Affected

All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this vulnerability using web browsers and web servers, which is one of the most likely exploitation scenarios.
Overview

US-CERT is aware of a design vulnerability found in the way SSL 3.0 handles block cipher mode padding. The POODLE attack demonstrates how an attacker can exploit this vulnerability to decrypt and extract information from inside an encrypted transaction.
Description

The SSL 3.0 vulnerability stems from the way blocks of data are encrypted under a specific type of encryption algorithm within the SSL protocol. The POODLE attack takes advantage of the protocol version negotiation feature built into SSL/TLS to force the use of SSL 3.0 and then leverages this new vulnerability to decrypt select content within the SSL session. The decryption is done byte by byte and will generate a large number of connections between the client and server.

While SSL 3.0 is an old encryption standard and has generally been replaced by Transport Layer Security (TLS) (which is not vulnerable in this way), most SSL/TLS implementations remain backwards compatible with SSL 3.0 to interoperate with legacy systems in the interest of a smooth user experience. Even if a client and server both support a version of TLS the SSL/TLS protocol suite allows for protocol version negotiation (being referred to as the “downgrade dance” in other reporting). The POODLE attack leverages the fact that when a secure connection attempt fails, servers will fall back to older protocols such as SSL 3.0. An attacker who can trigger a connection failure can then force the use of SSL 3.0 and attempt the new attack. [1]

Two other conditions must be met to successfully execute the POODLE attack: 1) the attacker must be able to control portions of the client side of the SSL connection (varying the length of the input) and 2) the attacker must have visibility of the resulting ciphertext. The most common way to achieve these conditions would be to act as Man-in-the-Middle (MITM), requiring a whole separate form of attack to establish that level of access.

These conditions make successful exploitation somewhat difficult. Environments that are already at above-average risk for MITM attacks (such as public WiFi) remove some of those challenges.
Impact

The POODLE attack can be used against any system or application that supports SSL 3.0 with CBC mode ciphers. This affects most current browsers and websites, but also includes any software that either references a vulnerable SSL/TLS library (e.g. OpenSSL) or implements the SSL/TLS protocol suite itself. By exploiting this vulnerability in a likely web-based scenario, an attacker can gain access to sensitive data passed within the encrypted web session, such as passwords, cookies and other authentication tokens that can then be used to gain more complete access to a website (impersonating that user, accessing database content, etc.).
Solution

There is currently no fix for the vulnerability SSL 3.0 itself, as the issue is fundamental to the protocol; however, disabling SSL 3.0 support in system/application configurations is the most viable solution currently available.

Some of the same researchers that discovered the vulnerability also developed a fix for one of the prerequisite conditions; TLS_FALLBACK_SCSV is a protocol extension that prevents MITM attackers from being able to force a protocol downgrade. OpenSSL has added support for TLS_FALLBACK_SCSV to their latest versions and recommend the following upgrades: [2]

    OpenSSL 1.0.1 users should upgrade to 1.0.1j.
    OpenSSL 1.0.0 users should upgrade to 1.0.0o.
    OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

Both clients and servers need to support TLS_FALLBACK_SCSV to prevent downgrade attacks.

Other SSL 3.0 implementations are most likely also affected by POODLE. Contact your vendor for details. Additional vendor information may be available in the National Vulnerability Database (NVD) entry for CVE-2014-3566. [3]
References

    [1] This Poodle Bites: Exploiting The SSL Fallback
    [2] OpenSSL Security Advisory [15 Oct 2014]
    [3] Vulnerability Summary for CVE-2014-3566

Revision History

    October 17, 2014 Initial Release

_________________
CF-D1DW2,CF-U1AQC,CF-29LTQ,CF-31SBM,CF-52youngGUN,

Life's Journey is not to arrive safely at the grave in a well preserved body, but rather to skid in sideways totally worn-out shouting 'Woo Hoo! What a ride!

Motorsports - the only real sport. If it doesn't have a motor, it is just a game.

There is always something waiting at the end of the road, if you are not willing to see what it is, you probably shouldn't be out there in the first place.


Top
   
PostPosted: Fri Oct 17, 2014 12:52 pm 
Offline
User avatar

Joined: Fri Jan 18, 2013 11:35 am
Posts: 2971
Woof, Woof......Can someone dumb this down for a non network guy like me to understand?

I feel dumb this week

_________________
Life will beat you into submission.


Top
   
PostPosted: Fri Oct 17, 2014 1:17 pm 
Offline
User avatar

Joined: Fri Feb 22, 2013 3:10 pm
Posts: 860
Location: Edmonton, Alberta
They are saying that the old SSL 3.0 is vulnerable to attach, allowing the attacker to decrypt secure, encrypted connections.
Disabling SSL 3.0 in your browser would help. That is my take on the situation. Others may be able to add/correct info.

_________________
CF-D1DW2,CF-U1AQC,CF-29LTQ,CF-31SBM,CF-52youngGUN,

Life's Journey is not to arrive safely at the grave in a well preserved body, but rather to skid in sideways totally worn-out shouting 'Woo Hoo! What a ride!

Motorsports - the only real sport. If it doesn't have a motor, it is just a game.

There is always something waiting at the end of the road, if you are not willing to see what it is, you probably shouldn't be out there in the first place.


Top
   
PostPosted: Fri Oct 17, 2014 2:59 pm 
Offline
User avatar

Joined: Sat Jun 07, 2014 7:39 am
Posts: 681
Location: Canada
Patched all my servers two days ago. Essentially this is a man-in-the-middle type attack where you would have to sniff on the same network as either the client or host. This is difficult to do on a wired network and someone would have to be after something specific to go through the trouble. However it gets easier on unsecured  public wifi. Just upgrade your browsers and you should be fine.

_________________
CF-19 MK2 TOUCHSCREEN || CF-19 MK2 DIGITIZER || CF-30 MK3 "Jeff Edition" || CF-19 MK4


Top
   
PostPosted: Fri Oct 17, 2014 6:37 pm 
Offline
User avatar

Joined: Fri Feb 22, 2013 3:10 pm
Posts: 860
Location: Edmonton, Alberta
Here is the Microsoft notice. FYI

Code:
********************************************************************
Title: Microsoft Security Advisory Notification
Issued: October 17, 2014
********************************************************************

Security Advisories Updated or Released Today
==============================================

* Microsoft Security Advisory (2949927)
  - Title: Vulnerability in SSL 3.0 Could Allow Information
    Disclosure
  - https://technet.microsoft.com/library/security/2949927
  - Revision Note: V2.0 (October 17, 2014): Removed Download Center
    links for Microsoft security update 2949927. Microsoft recommends
        that customers experiencing issues uninstall this update.
        Microsoft is investigating behavior associated with this update,
        and will update the advisory when more information becomes
        available.

_________________
CF-D1DW2,CF-U1AQC,CF-29LTQ,CF-31SBM,CF-52youngGUN,

Life's Journey is not to arrive safely at the grave in a well preserved body, but rather to skid in sideways totally worn-out shouting 'Woo Hoo! What a ride!

Motorsports - the only real sport. If it doesn't have a motor, it is just a game.

There is always something waiting at the end of the road, if you are not willing to see what it is, you probably shouldn't be out there in the first place.


Top
   
PostPosted: Fri Oct 17, 2014 8:13 pm 
Offline
User avatar

Joined: Fri Feb 22, 2013 3:10 pm
Posts: 860
Location: Edmonton, Alberta
There is an extension for Firefox that will set the minimum TLS version to TLS 1.0, disabling SSL v3. Here is info about it:

Code:
SSL Version Control 0.2
Adds a simple preference to set the minimum SSL version that Firefox will accept.SSLv3 is now insecure, and is soon going to be disabled by default.
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/

In the meantime, you can use this extension to turn off SSLv3 in your copy of Firefox. When you install the add-on, it will set the minimum TLS version to TLS 1.0 (disabling SSLv3). If you want to change that setting later, like if you really need to access an SSLv3 site, just go to Tools / Add-ons and click the "Preferences" button next to the add-on. That will give you a drop-down menu to select the minimum TLS version you want to allow.

As of version 0.2, this add-on should work with all Mozilla products, including Firefox, Firefox for Android, Thunderbird, and Seamonkey.


https://addons.mozilla.org/en-US/firefox/addon/ssl-version-control/?src=api

Other browsers should have some method to disable SSL v3.

_________________
CF-D1DW2,CF-U1AQC,CF-29LTQ,CF-31SBM,CF-52youngGUN,

Life's Journey is not to arrive safely at the grave in a well preserved body, but rather to skid in sideways totally worn-out shouting 'Woo Hoo! What a ride!

Motorsports - the only real sport. If it doesn't have a motor, it is just a game.

There is always something waiting at the end of the road, if you are not willing to see what it is, you probably shouldn't be out there in the first place.


Top
   
PostPosted: Fri Oct 17, 2014 8:27 pm 
Offline
User avatar

Joined: Tue Dec 21, 2010 12:51 pm
Posts: 1894
Location: Northeast Louisiana
Glad I don't have to worry about this on my server, unless they are wanting to play minecraft, lol. Then they can fight the kids over it.

_________________
CF-28 MK2,Mk3 / CF-29 Mk3 / CF-30 MK2 / CF-25 Mk1 ATI / CF-19 MK3/Mk3/Mk5 / CF-U1 Mk1,Mk2 / CF-M34 Mk7/Mk3 / CF-17 Mk1 / CF-07
Voodoo Envy M355 / M360 / M515 / M780 / U703 / Voodoo Hexx / Voodoo Idol / Voodoo Rage F1 / Voodoo Rage F1 / Voodoo Rage F1 "signed case" / Voodoo Omen
Alienware M11x R1


Top
   
PostPosted: Mon Oct 20, 2014 4:55 am 
Offline
User avatar

Joined: Mon Mar 16, 2009 9:15 pm
Posts: 317
Location: 12 Acres on the Rappahannock!
I wonder how serious this is for the average person....

_________________
Rugged Toughbooks of all types... CF-31s, CF-30s, CF-29s, CF-19s, CF-52s, CF-53s, CF-74s, CF-H2... Hmmm... What else can I buy, build or modify?


Top
   
PostPosted: Mon Oct 20, 2014 5:07 am 
Offline
User avatar

Joined: Fri Jan 18, 2013 11:35 am
Posts: 2971
Toughbook wrote:
I wonder how serious this is for the average person....



Does that imply that you think anyone here is average? I think we all missed that train long ago.

_________________
Life will beat you into submission.


Top
   
PostPosted: Mon Oct 20, 2014 8:23 am 
Offline
User avatar

Joined: Sat Jun 07, 2014 7:39 am
Posts: 681
Location: Canada
mklym wrote:
There is an extension for Firefox that will set the minimum TLS version to TLS 1.0, disabling SSL v3. Here is info about it:

https://addons.mozilla.org/en-US/firefox/addon/ssl-version-control/?src=api

Other browsers should have some method to disable SSL v3.


No need for an add-on. Setting security.tls.version.min = 1 in about:config is sufficient.

Toughbook wrote:
I wonder how serious this is for the average person....


Serious enough but easy to fix on the client side's browser while we're waiting for permanent fixes through browser upgrades.

_________________
CF-19 MK2 TOUCHSCREEN || CF-19 MK2 DIGITIZER || CF-30 MK3 "Jeff Edition" || CF-19 MK4


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic  [ 10 posts ] 

All times are UTC-06:00


Who is online

Users browsing this forum: No registered users and 2 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB® Forum Software © phpBB Limited