TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The Freak Attack SSL/TLS Vulnerability

292 pointsby markthethomasabout 10 years ago

25 comments

nodesocketabout 10 years ago
We wrote a blog post: The perfect SSL nginx configuration (<a href="http://blog.commando.io/the-perfect-nginx-ssl-configuration/" rel="nofollow">http:&#x2F;&#x2F;blog.commando.io&#x2F;the-perfect-nginx-ssl-configuration&#x2F;</a>) which details all the nginx directives to set to achieve an A+ rating on sslLabs, including mitigation of FREAK, POODLE, and HEARTBLEED.
评论 #9143204 未加载
评论 #9142950 未加载
评论 #9142505 未加载
评论 #9142647 未加载
评论 #9143537 未加载
评论 #9142370 未加载
评论 #9142851 未加载
评论 #9142434 未加载
评论 #9143406 未加载
elchiefabout 10 years ago
Please see &quot;Recommended Configurations&quot; in <a href="https://wiki.mozilla.org/Security/Server_Side_TLS" rel="nofollow">https:&#x2F;&#x2F;wiki.mozilla.org&#x2F;Security&#x2F;Server_Side_TLS</a> to see which cipher suite you should be using on your server.<p>Above also shows how to configure most common web servers.<p>You can see which cipher suite your server is using at <a href="https://www.ssllabs.com/ssltest/" rel="nofollow">https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssltest&#x2F;</a>
评论 #9142221 未加载
Animatsabout 10 years ago
OpenSSL has way too many options that reduce security. A lot of that legacy code needs to be removed outright. Not turned off by some flag, not controlled by some environment variable, <i>removed</i>.<p>(And then, when Rust settles down, OpenSSL needs to be rewritten in Rust, as cleanly as possible.)
评论 #9143129 未加载
评论 #9144520 未加载
onyxravenabout 10 years ago
Amazon already updated their ELB policies to disable RC4<p><a href="https://forums.aws.amazon.com/ann.jspa?annID=2877" rel="nofollow">https:&#x2F;&#x2F;forums.aws.amazon.com&#x2F;ann.jspa?annID=2877</a>
评论 #9144069 未加载
评论 #9143198 未加载
skuhnabout 10 years ago
I can&#x27;t believe that they are outright naming vulnerable sites, that is really classless. Even if the data could be gathered by an attacker now that a vulnerability is known, you don&#x27;t need to go the extra mile to provide it.
评论 #9142030 未加载
评论 #9142048 未加载
评论 #9142102 未加载
评论 #9142257 未加载
评论 #9142561 未加载
评论 #9142082 未加载
评论 #9144596 未加载
peteretepabout 10 years ago
LibreSSL removed the US Export cyphers by default, afaict, so shouldn&#x27;t be vulnerable.
评论 #9143465 未加载
spattenabout 10 years ago
If you&#x27;re using AWS Elastic Load Balancer, then the quick fix is:<p>1) Select the load balancer you want to edit 2) Click the &quot;Listeners&quot; tab 3) Click &quot;change&quot; under the &quot;Cipher&quot; column for the HTTPS row 4) Select the most recent pre-defined security policy, from 2015-02.<p>This should get you an A on SSL Lab&#x27;s test[1]<p><a href="https://www.ssllabs.com/ssltest/" rel="nofollow">https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssltest&#x2F;</a>
jsmeatonabout 10 years ago
Is there an easy way to check our own servers? I can see the fix is to add !EXPORT to the end of the cipher list, but how do we check that the server requires the fix?<p>Really disappointed with this announcement. Some of the other named exploits have come with repro instructions and usually with a fix (shellshock notwithstanding). This is just a description and a shame list.
评论 #9142451 未加载
paulannesleyabout 10 years ago
That page has a meta description for different vulnerability: &lt;meta name=&quot;description&quot; content=&quot;POODLE Attack and SSLv3 Support Measurement&quot; &#x2F;&gt;
评论 #9142265 未加载
sandwormabout 10 years ago
<a href="https://freakattack.com/clienttest.html" rel="nofollow">https:&#x2F;&#x2F;freakattack.com&#x2F;clienttest.html</a><p>I just tested my devices. Linux machines running firefox all passed. On the other hand my Android phone did not, lots of RSA_EXPORT ciphers accepted.<p>But as with nearly every security story: linux&#x2F;foss software for the WIN!
评论 #9142887 未加载
评论 #9143272 未加载
评论 #9142119 未加载
评论 #9142974 未加载
orblivionabout 10 years ago
So this isn&#x27;t just a thing where I update openssl? I have to learn about configuring cyphers on short notice?
评论 #9145477 未加载
sdaflje5safabout 10 years ago
<a href="http://undeadly.org/cgi?action=article&amp;sid=20150304092744" rel="nofollow">http:&#x2F;&#x2F;undeadly.org&#x2F;cgi?action=article&amp;sid=20150304092744</a><p>The following CVEs did not apply to LibreSSL: ... CVE-2015-0204 - RSA silently downgrades to EXPORT_RSA<p>Don&#x27;t forget: <a href="http://www.openbsdfoundation.org/" rel="nofollow">http:&#x2F;&#x2F;www.openbsdfoundation.org&#x2F;</a>
bjornsingabout 10 years ago
To me the whole idea of negotiating ciphers seems broken: a man-in-the-middle will always choose the weakest one.<p>I guess the argument is that cipher negotiation lets you implement stronger crypto without defining a new protocol version, but what is the point of that? An attacker will just negotiate for the weaker cipher anyway (unless this negotiation is cryptographically protected too of course, but this seems so complex in comparison with the rather meaningless &quot;goal&quot; of cipher negotiation).
IgorPartolaabout 10 years ago
Here&#x27;s how I&#x27;ve been testing this:<p>openssl s_client -cipher EXPORT -connect www.example.com:443<p>SSL Labs hasn&#x27;t listed this vulnerability explicitly yet, but the test seems pretty simple.
PC_Hawkabout 10 years ago
Its interesting too me that Firefox is supposedly not vulnerable, yet on both my laptop (Windows 8.1 Firefox 36) and My Desktop (Windows 7 Firefox 36) the website (freakattack.com) says i AM vulnerable?<p>&quot;Warning! Your client is vulnerable to CVE-2015-0204. Even though your client doesn&#x27;t offer any RSA EXPORT suites, it can still be tricked into using one of them. We encourage you to upgrade your client. &quot;
D4AHNGMabout 10 years ago
Checked Google Chrome prior to update, said it was vulnerable. Updated and now it isn&#x27;t. Firefox 37 on OS X wasn&#x27;t vulnerable apparently.
pakled_engineerabout 10 years ago
Can also just install LibreSSL portable and it will fix all these issues of insecure ciphers, SSL3 ect.
arca_voragoabout 10 years ago
I&#x27;ve recently been running Hiawatha servers with PolarSSL (recently renamed something else). I have avoided all the most recent bugs.<p><a href="https://tls.mbed.org/" rel="nofollow">https:&#x2F;&#x2F;tls.mbed.org&#x2F;</a>
hexasoftabout 10 years ago
Breakdown of FREAK sites (Alexa Top 1M) by country.<p><a href="https://infogr.am/https_sites_that_support_rsa_export_suites" rel="nofollow">https:&#x2F;&#x2F;infogr.am&#x2F;https_sites_that_support_rsa_export_suites</a>
devineganabout 10 years ago
If you want to check your domains&#x2F;servers, not just your clients I updated a cipher verification script to just test Export (EXP) ciphers via openssl: <a href="https://gist.github.com/degan/70e8059507d173751294" rel="nofollow">https:&#x2F;&#x2F;gist.github.com&#x2F;degan&#x2F;70e8059507d173751294</a>
评论 #9142519 未加载
chinathrowabout 10 years ago
Waiting for ssllabs.com to add FREAK checks. Thanks guys, welcomo your support!
jonahxabout 10 years ago
How can I test if my own, Heroku-based servers are affected?
评论 #9142444 未加载
评论 #9142628 未加载
curiouslyabout 10 years ago
is cloudflare safe from this?
评论 #9143057 未加载
ebbvabout 10 years ago
This is a very disappointing trend in security. Publicly shaming sites into action is not a benefit that outweighs making it easier for attackers. It&#x27;s ridiculous to argue that it is.
评论 #9142105 未加载
评论 #9142104 未加载
评论 #9142190 未加载
diltonmabout 10 years ago
freakattack.com is an IP owned and managed by the University of Michigan. I could not visit the site due to them being in my firewall&#x27;s ban list caused by unauthorized vulnerability testing against my home network.<p>As an aside I wonder why our tax dollars are being used to support unauthorized vulnerability attempts and for hosting a .com commercial site?<p>Is it legal for the person&#x2F;people operating freakattack.com to use US Tax Income to fund their own commercial efforts using University resources? I didn&#x27;t graduate college, maybe it&#x27;s legal for them to do this?
评论 #9142574 未加载
评论 #9142649 未加载