TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Attack of the week: Logjam

37 pointsby jcurboalmost 10 years ago

3 comments

nadamsalmost 10 years ago
If you are using Debian 7 or similar distro with an older version of Apache you can avoid it by using the following ciphers[1]:<p>SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-DSS-AES128-SHA256:DHE-DSS-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!DHE-RSA-AES128-GCM-SHA256:!DHE-RSA-AES256-GCM-SHA384:!DHE-RSA-AES128-SHA256:!DHE-RSA-AES256-SHA:!DHE-RSA-AES128-SHA:!DHE-RSA-AES256-SHA256:!DHE-RSA-CAMELLIA128-SHA:!DHE-RSA-CAMELLIA256-SHA<p>However if you are using Apache 2.4.8 or later just follow the instructions here[2]<p>Either should get you an &quot;A&quot; on SSL labs test[3]<p>[1] <a href="http:&#x2F;&#x2F;serverfault.com&#x2F;questions&#x2F;693306&#x2F;trying-to-mitigate-logjam-on-apache-2-2-16&#x2F;" rel="nofollow">http:&#x2F;&#x2F;serverfault.com&#x2F;questions&#x2F;693306&#x2F;trying-to-mitigate-l...</a><p>[2] <a href="https:&#x2F;&#x2F;weakdh.org&#x2F;sysadmin.html" rel="nofollow">https:&#x2F;&#x2F;weakdh.org&#x2F;sysadmin.html</a><p>[3] <a href="https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssltest&#x2F;analyze.html" rel="nofollow">https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssltest&#x2F;analyze.html</a>
dolfjealmost 10 years ago
I encourage all people to check their website. On our checker (<a href="http:&#x2F;&#x2F;security.uwsoftware.be&#x2F;logjam" rel="nofollow">http:&#x2F;&#x2F;security.uwsoftware.be&#x2F;logjam</a>) we see that 59% is still vulnerable (&lt;= 1024 key). Even after checking most people don&#x27;t upgrade. Note: the solution isn&#x27;t that difficult (see <a href="https:&#x2F;&#x2F;weakdh.org&#x2F;sysadmin.html" rel="nofollow">https:&#x2F;&#x2F;weakdh.org&#x2F;sysadmin.html</a>)
yuhongalmost 10 years ago
What is also fun is that neither IE or Netscape support DHE_RSA_EXPORT, and they didn&#x27;t bother with DHE_RSA_EXPORT1024 at all (only DHE_DSS_EXPORT1024).