TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Major security flaw undermines Apple and Google users, researchers discover

91 pointsby derekjobstabout 10 years ago

9 comments

Kronopathabout 10 years ago
This news story is way too light on details for this audience. A better description of the vulnerability is here: <a href="https://www.freakattack.com/" rel="nofollow">https:&#x2F;&#x2F;www.freakattack.com&#x2F;</a><p>A summary:<p><i>The vulnerability allows attackers to intercept HTTPS connections between vulnerable clients and servers and force them to use ‘export-grade’ cryptogrpahy, which can then be decrypted.</i><p><i>A connection is vulnerable if the server accepts RSA_EXPORT cipher suites and the client either offers an RSA_EXPORT suite or is using a version of OpenSSL that is vulnerable to CVE-2015-0204. Vulnerable clients include many Google and Apple devices (which use unpatched OpenSSL), a large number of embedded systems, and many other software products that use TLS behind the scenes without disabling the vulnerable cryptographic suites.</i><p>It also includes a list of vulnerable websites, including sites like mit.edu, groupon.com, marriott.com, and americanexpress.com (!).
评论 #9141451 未加载
AnimalMuppetabout 10 years ago
The story has a familiar ring.<p>Back in the day, Microsoft stored passwords in a fairly insecure format. Then they got security religion, and improved the strength of their password storage dramatically. It was very hard to crack the new format. (I don&#x27;t remember exactly, but this would have been somewhere around when NT came out.)<p>But Microsoft was always big on backward compatibility. They wanted users of old machines to still be able to log in to the new servers. So they stored the passwords in the new, strong format, <i>and</i> in the old, weak format, so that they could still authenticate old clients. And that meant that attackers could still get the passwords in the weak format if they could get on the server.<p>This is from memory, and it&#x27;s been over a decade, so I may not have all the details exactly correct...
评论 #9140569 未加载
评论 #9140679 未加载
评论 #9140237 未加载
rbanffyabout 10 years ago
If <a href="http://dualec.org/DualECTLS.pdf" rel="nofollow">http:&#x2F;&#x2F;dualec.org&#x2F;DualECTLS.pdf</a> is the actual paper, I am not sure why Apple and Google users are more exposed than others. The paper requires a more thoughtful reading, of couse, but it does not appear to single out these two vendors.
评论 #9140304 未加载
nmcabout 10 years ago
I feel puzzled. How can a WP journalist link to <i>three</i> blog posts about the attack, while not linking to the actual researchers&#x27; website?<p>Here it is: <a href="https://www.smacktls.com" rel="nofollow">https:&#x2F;&#x2F;www.smacktls.com</a>
yuhongabout 10 years ago
What is sad is that OpenSSL disabled the EXPORT1024 ciphersuites in 2006. If you don&#x27;t know what these are, in year 1999 the US government raised the limit to 56-bit encryption and 1024-bit RSA. They were described in <a href="https://tools.ietf.org/html/draft-ietf-tls-56-bit-ciphersuites-01" rel="nofollow">https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-ietf-tls-56-bit-ciphersuit...</a> . And for the record it was in year 2000 that the restrictions was removed for &quot;retail&quot; software.
MBlumeabout 10 years ago
I love the focus on how the Whitehouse&#x2F;NSA&#x2F;FBI sites are vulnerable. Someone could use this to attack the White House!<p><a href="https://xkcd.com/932/" rel="nofollow">https:&#x2F;&#x2F;xkcd.com&#x2F;932&#x2F;</a>
deathanatosabout 10 years ago
&gt; Google’s Chrome browser is not vulnerable to the FREAK bug, but the browser that comes built into most Android devices is vulnerable.<p>Is this true? Both Chrome on my mobile device and on my laptop show as vulnerable on freakattack.com. Both have outstanding updates[1]; however, if only mean the latest version is not vulnerable, I feel like the message that we need to send the layman is &quot;update, now (and really, always)&quot; not &quot;is not vulnerable&quot;<p>[1] which Chrome wasn&#x27;t able to actually download earlier, but all seems good now.
zarothabout 10 years ago
If such a suite was enabled, how would the plethora of SSL testing sites out there have graded it? I assume a passing grade would not have allowed insecure suites such as these to be allowed. Insecure cipher is insecure; that would not typically be worthy of a CVE? It sounds more like even if the suite was not on your accepted list, a MITM could cause the server to downgrade?<p>This is all OpenSSL has to say about it;<p><pre><code> RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204) ============================================================== Severity: Low An OpenSSL client will accept the use of an RSA temporary key in a non- export RSA key exchange ciphersuite. A server could present a weak temporary key and downgrade the security of the session. This issue affects all current OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8. OpenSSL 1.0.1 users should upgrade to 1.0.1k. OpenSSL 1.0.0 users should upgrade to 1.0.0p. OpenSSL 0.9.8 users should upgrade to 0.9.8zd. This issue was reported to OpenSSL on 22nd October 2014 by Karthikeyan Bhargavan of the PROSECCO team at INRIA. The fix was developed by Stephen Henson of the OpenSSL core team. </code></pre> I find these notes are usually too curt to really understand what&#x27;s going on...<p>Also, that CVE is from Jan 8, 2015, while this is claiming to be a new issue disclosed today. I&#x27;ve seen no mention on the oss-security list of &quot;FREAK&quot;, so something is borked with this disclosure if it is a new vulnerability...
netheril96about 10 years ago
&gt; In recent days, FBI.gov and Whitehouse.gov have been fixed, though NSA.gov remains vulnerable, said Green.<p>Haha, the irony. I guess it now proves to NSA why <i>they</i> are also vulnerable when they mandate backdoors in common software.