back to article FREAK show: Apple and Android SSL WIDE OPEN to snoopers

Security researchers are warning of a flaw in OpenSSL and Apple's SecureTransport – a hangover from the days when the US government was twitchy about the spread of cryptography. It's a flaw that allows an attacker to decrypt your login cookies, and other sensitive information, from your HTTPS connections if you use a …

Page:

  1. Adam 1

    >FREAK (Factoring RSA Export Keys)

    I'm just glad that we have a proper acronym for this vulnerability.

    1. asphytxtc
      Stop

      What? No logo? How can we take this vulnerability seriously...

    2. Crazy Operations Guy
      Headmaster

      But shouldn't the acronym be FREK?

    3. Anonymous Coward
      Anonymous Coward

      Acronym

      Why not "Factoring USA-Compromised Keys"?

  2. Mark 65

    A Question

    The list of how to use items has something along the lines of: convince to use crap key, factor key, then can inject what they want into the stream. Now, given we are also told that to factor the key would require about $100 of processing on AWS would I be right in suggesting this is more of a TLA flaw or highly targeted spear-fishing exercise toolkit rather than something your average pleb should fear? i.e. for the man on the street it is more of a theoretical exercise than a reality if we ignore for a moment those special folks at the NSA and GCHQ?

    1. Flocke Kroes Silver badge

      Re: A Question

      Have you got over $100 in your bank account? Is your credit limit over $100? Can you borrow $101 from Wonga?

      1. MacroRodent

        Re: A Question

        Also, how long would factoring the 512 bit value take on a modern top of the line CPU you already might have in your PC? (Or if not the CPU, then the GPU).

      2. Chris King

        Re: A Question

        Can criminals steal $100 from you in another crime to finance this one ?

        Cost is not a deterrent to someone who can steal or con their way to affording something.

    2. Brewster's Angle Grinder Silver badge

      Re: A Question

      Accoording to Matthew Green it takes a lot of time to generate the keys. So a server will reuse the key; specifically, "Apache mod_ssl by default will generate a single export-grade RSA key when the server starts up, and will simply re-use that key for the lifetime of that server....[which means] you can obtain that RSA key once, factor it, and break every session you can get your 'man in the middle' mitts on until the server goes down."

      This point should've been in the article.

      1. Mark 65

        Re: A Question

        @Brewster: Thanks, that's an important missing point.

        On my previous comment and responses, that $100 is easy to come by is irrelevant as that implies a targeted attack on the client end or else you need to be able to afford to MITM however many clients to pursue the necessary pot of gold.

        The fact that this missing (in the article) information states you can target a server which is using a single (per uptime) key gives rise to a much better use of a $100 once-off outlay and opens the attack up to all and sundry.

  3. Anonymous Coward
    Anonymous Coward

    Android 4.4.2 (Kit Kat) appears to be vulnerable.

    1. Dazed and Confused
      Unhappy

      Why was that down voted?

      Pointing my SGS4 with Android 4.4.2 at the site says it's vulnerable.

      1. Anonymous Coward
        Meh

        Re: Why was that down voted?

        It happens a lot here, just ignore it. Show a Fanboy a fact they don't like and accept the down votes.

        I would LOVE to see Reg's traffic stats to see how many come from Google, Apple and Microsoft sites.

    2. Anonymous Coward
      Trollface

      Ouch....sorry this is going to hurt.

      Internet Explorer on Windows phone is NOT vulnerable.

      Sorry for any embarrassment caused.

      1. Anonymous Coward
        Angel

        Re: Ouch....sorry this is going to hurt.

        So Windows and Explorer are now the most secure platforms available?

        Surely a sign that the end times are upon us!

      2. Daniel B.
        Boffin

        Re: Ouch....sorry this is going to hurt.

        Internet Explorer on Windows phone is NOT vulnerable.

        Sorry for any embarrassment caused.

        Blackberry OS 6 here, NOT vulnerable as well. Looks like I'm being vindicated about saying that BBOS was more secure than the popular stuff.

        1. Anonymous Coward
          Anonymous Coward

          Re: Ouch....sorry this is going to hurt.

          HTC One (M8) with Android 5.0.1 (latest versions of everything)

          Built in HTC Internet app (7.0...): Vulnerable

          Google Chrome (40.0.2214...): Vulnerable

          Opera (27.0.1698...): Vulnerable

          Maybe it's just an Android thing and I'll have to wait until I get another OS upgrade from HTC in a year...

          1. Dan 55 Silver badge
            Thumb Up

            Re: Ouch....sorry this is going to hurt.

            Happily Firefox Mobile is immune from this problem. If you can't get Android updates then probably the only secure browser is Firefox because it's not a Webkit skin and it uses its own SSL libraries.

  4. Kevin McMurtrie Silver badge
    WTF?

    Stuck on old Android

    This is an issue with telcos locking down phones that they claim they're selling to you. You should never buy a locked phone. You will regret it in 6 months when you've hit a major bug and the telco offers to fix it with a $250 phone swap.

    BTW, Apple stops providing security patches to older models too and offers no workaround other than switching to Linux or buying a new computer that isn't actually any faster.

    1. Anonymous Coward
      Anonymous Coward

      Re: Stuck on old Android

      About a year ago Apple released a security update for iOS 6 to version 6.1.6 - the latest version a 3gs can run which was ALMOST FIVE YEARS OLD at the time. I would not be shocked if a version 6.1.7 pops out in a few weeks, though maybe supporting the 3gs almost six years after its release is asking a bit much.

      The situation with security patches for iOS is not even remotely comparable to Android. Try again.

      1. Anonymous Coward
        Anonymous Coward

        Re: Stuck on old Android

        iOS 6 is three years old.

        And someone complained - and still complains - MS stopped supporting a fourteen year old OS....

      2. Chris King

        Re: Stuck on old Android

        Five years is "obsolete" in Apple terms, but interestingly no iPhones apart from the original model are currently listed at https://support.apple.com/en-us/ht1752 - it's possible the 3gs might get an update, but I wouldn't bank on it.

    2. Adam 1

      Re: Stuck on old Android

      I'm completely sure Google will have patched this 90 days after it was reported.

    3. Anonymous Coward
      Anonymous Coward

      Re: Stuck on old Android

      What? Your comment makes it sound as though you can run Linux on unsupported Apple phones...

      If you're (as I know you are) talking about Apple computers, well you can run a whole lot more than Linux on them. Open your mind dude!

    4. Anonymous Coward
      Anonymous Coward

      Re: Stuck on old Android

      Computers or phones?

      My 2010 Mac Mini is still supported by OSX.

    5. Dazed and Confused

      Re: Stuck on old Android

      No just an issue for people with locked phones with nabbled SW, unlocked phones can have this too.

  5. Mark 85

    IE10???

    According freakattack.com, the IE10 browser I have is vulnerable but Firefox (browser of choice, first/last/always currently) isn't.

    Yeah... I'm lax in not upgrading IE10 to 11. It's my backup for one site that I use daily that IE11 doesn't play nice with.

    1. Geoff Campbell Silver badge
      Black Helicopters

      Re: IE10???

      Chrome v40 appears to be safe.

      GJC

      1. Anonymous Coward
        Anonymous Coward

        Re: IE10???

        I think chrome 40 is vulnerable but 41 (stable release around today) is not.

        1. thesykes

          Re: IE10???

          Running Chrome v40 and the checker website says all OK.

    2. Anonymous Coward
      Anonymous Coward

      Re: IE10???

      You stay on an insecure browser for one poxy site...? Just run the fraking thing in a VM.

    3. Charlie Clark Silver badge

      Re: IE10???

      Firefox uses NSS instead of OpenSSL. This just means different bugs, though I doubt that NSS's internals are quite as hair-brained as OpenSSL

      1. Z80
        Headmaster

        Re: IE10???

        harebrained

    4. Mark 85

      Re: IE10???

      FTR, it seems that all IE browers are vulnerable to this... goodbye IE...

  6. Anonymous Coward
    Anonymous Coward

    Don't hold your breath

    "Hopefully attacks like this may make him think...

    On evidence so far the minimum required to achieve a measurable amount of sustained, independent thought would be major surgery to add the relevant grey matter. To make the output usable though is probably beyond medical science.

  7. Panicnow

    JUST FIX THE SERVERS!

    This is a negotiation, if the servers will not except 512, then no harm done!

    1. Anonymous Coward
      Anonymous Coward

      Re: JUST FIX THE SERVERS!

      That's one way (and the easiest way) to solve it but if people want good security then they need to step up and ensure that it's happening at their end rather than just passing the buck.

    2. Anonymous Coward
      Anonymous Coward

      Re: JUST FIX THE SERVERS!

      Negotiation is a 2 way thing.

    3. Adam 1

      Re: JUST FIX THE SERVERS!

      Accept!

    4. phuzz Silver badge
      Stop

      Re: JUST FIX THE SERVERS!

      What the article doesn't mention, is that a lot of of the vulnerable servers belong to CDNs such as Akamai, who are rolling out fixes now, which should bring that 36% down quickly.

      (source)

  8. Bronek Kozicki
    Mushroom

    keyword: either

    One thing that hit me was this "... and the client either offers an RSA_EXPORT suite or is using a version of OpenSSL that is vulnerable to CVE-2015-0204"

    Basically, one of the decisions taken by OpenSSL developers was (and still is) "do not remove compatibility features", thus we can still see bits of code specifically for platforms such as VMS or Win16 - even though OpenSSL has not been tested on those for a very, very long time. It also implements full support for weak encryption such as RSA_EXPORT. Hilariously OpenSSL even implements certificate check to fail the connection if stronger encryption than 512bit was employed on RSA_EXPORT session (look for SSL_alert_type_string).

    Why do I point it out? Because vulnerability to degrade connection to insecure RSA_EXPORT would not happen, if OpenSSL did not keep such insecure implementation in the first place. But of course, it would go against philosophy of key developers. Which is why alternative libraries such as LibreSSL are so important.

    1. Daniel B.
      Boffin

      There is one use for EXPORT in OpenSSL though

      I use it all the time to check for exactly this kind of stuff:

      openssl s_client -connect www.my.site.with.ssl.com:443 -cipher EXPORT

      I've been checking for both this and TDES usage since 2011. I've also made a point of disabling EXPORT, RC4 and TDES ciphers on whatever service I'm configuring from scratch. This is something that everyone should know about, but seems to be noticed only when someone discloses it.

      I'd leave EXPORT support on OpenSSL for testing purposes only, but remove it from the "can downgrade to this cipher" list.

      The fun fact about this is that it's the US Government's fault, and maybe the NSA's fault as well. The 90s had a lot of criticism on the ban on strong crypto export, and we all knew that was going to come back to bite 'em down the road.

      1. Bronek Kozicki

        Re: There is one use for EXPORT in OpenSSL though

        hah good point - cannot check whether "hack my users, please" is disabled, without a tool to actually request this protocol.

    2. Michael Wojcik Silver badge

      Re: keyword: either

      It's trivial to exclude the EXPORT suites in the cipher-suite list when using OpenSSL in an application, and trivial to build OpenSSL without support for them.

      While OpenSSL shouldn't be vulnerable to MITM downgrade attacks like CVE-2015-0204 (in which the client accepts the short temporary key even though it didn't include an EXPORT cipher suite in its ClientHello), there's little excuse for public servers that accept EXPORT suites by default today. That's either bad programming or bad administration.

      Certainly there's a strong argument to be made that OpenSSL shouldn't include the EXP ciphers in its DEFAULT list; but developers using OpenSSL should at least understand how to set the cipher-suite list and set it to at least "DEFAULT:!EXP" by default. (Note that the OpenSSL developers have announced plans to remove various suites from DEFAULT in the next year or so, to some controversy.)

      OpenSSL, out of the box, is not suitable for use by developers and administrators who don't want to be bothered learning anything about SSL/TLS. Those people shoud purchase a commercial solution and pay someone to walk them through it, or use some higher-level package that takes care of the gritty details. Blaming OpenSSL because people can't be bothered to learn how to use the tools they pick up is unfair.

      1. Daniel B.
        Boffin

        Re: keyword: either

        OpenSSL, out of the box, is not suitable for use by developers and administrators who don't want to be bothered learning anything about SSL/TLS.

        Pretty much any crypto API is not suitable for use by anyone who hasn't at least read something about SSL/TLS. I'm really surprised about the amount of devs, webmasters and sysadmins that had no idea about the existance of EXPORT ciphers at all. This is something they should know because a lot of them actually worked with the "international browser" versions from the late 90's which had the stupid 40-bit restriction hobbling SSL.

        There's also a very high amount of developers who use self-signed certs in production enviroments. Another good bunch that outright disable SSL certificate validation to get their stuff to work, basically opening up their security infrastructure to MITM attacks within the organizational network. You've probably noticed that this sounds a lot like how SuperFish does SSL ... well, this is why those devs thought it was normal. They're used to doing this.

        Oh well, at least some security-related products will have some kind of FIPS mode available. It's probably worth flipping that switch on as it will disable all EXPORT and LOW ciphers by default, including 3DES which is probably bound to be cracked in the near future.

      2. Avalanche

        Re: keyword: either

        You are missing the point: older versions OpenSSL will happily accept the export RSA when it didn't ask for it.

  9. Crisp

    "pushing hard for a backdoor"

    Sounds more kinky than sinister.

  10. Anonymous Coward
    Anonymous Coward

    An our PM says that we should be using less encryption to allow for more snooping. Pillock.

  11. Blacklight

    Nexus 5 / Android 5.0.1 / Chrome 40.0.2214.109 - oops

    Mine comes up with a nice fat "Warning! Your client is vulnerable to CVE-2015-0204".

    1. DryBones

      Re: Nexus 5 / Android 5.0.1 / Chrome 40.0.2214.109 - oops

      Same. I'm expecting a new version of Chrome in the next couple days.

Page:

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like