<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: FREAK attack on HTTPS</title>
	<atom:link href="http://www.epanorama.net/blog/2015/03/04/freak-attack-on-https/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2015/03/04/freak-attack-on-https/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 08:40:06 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/03/04/freak-attack-on-https/comment-page-1/#comment-1393662</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 20 May 2015 14:30:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30493#comment-1393662</guid>
		<description><![CDATA[Dan Goodin / Ars Technica: 	
Logjam crypto vulnerability affects tens of thousands of web and mail servers, browsers being updated with fix  —  HTTPS-crippling attack threatens tens of thousands of Web and mail servers  —  Diffie-Hellman downgrade weakness allows attackers to intercept encrypted data.

HTTPS-crippling attack threatens tens of thousands of Web and mail servers
http://arstechnica.com/security/2015/05/https-crippling-attack-threatens-tens-of-thousands-of-web-and-mail-servers/

Tens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found.

The vulnerability affects an estimated 8.4 percent of the top one million websites and a slightly bigger percentage of mail servers populating the IPv4 address space, the researchers said. The threat stems from a flaw in the transport layer security protocol that websites and mail servers use to establish encrypted connections with end users. The new attack, which its creators have dubbed Logjam, can be exploited against a subset of servers that support the widely used Diffie-Hellman key exchange, which allows two parties that have never met before to negotiate a secret key even though they&#039;re communicating over an unsecured, public channel.

The weakness is the result of export restrictions the US government mandated in the 1990s on US developers who wanted their software to be used abroad. 

&quot;Logjam shows us once again why it&#039;s a terrible idea to deliberately weaken cryptography, as the FBI and some in law enforcement are now calling for,&quot;

It wasn&#039;t supposed to be this way

Ironically, Diffie-Hellman is supposed to provide an additional layer of protection because it allows the two connected parties to constantly refresh the cryptographic key securing Web or e-mail sessions. The so-called perfect forward secrecy that Diffie-Hellman makes possible significantly increases the work of eavesdropping because attackers must obtain the key anew each time it changes, as opposed to only once with other encryption schemes, such as those based on RSA keys. Logjam is significant because it shows that ephemeral Diffie-Hellman—or DHE—can be fatal to TLS when the export-grade ciphers are supported. Logjam is reminiscent of the FREAK attack that also allowed attackers to downgrade HTTPS connections to 512-bit cryptography.]]></description>
		<content:encoded><![CDATA[<p>Dan Goodin / Ars Technica:<br />
Logjam crypto vulnerability affects tens of thousands of web and mail servers, browsers being updated with fix  —  HTTPS-crippling attack threatens tens of thousands of Web and mail servers  —  Diffie-Hellman downgrade weakness allows attackers to intercept encrypted data.</p>
<p>HTTPS-crippling attack threatens tens of thousands of Web and mail servers<br />
<a href="http://arstechnica.com/security/2015/05/https-crippling-attack-threatens-tens-of-thousands-of-web-and-mail-servers/" rel="nofollow">http://arstechnica.com/security/2015/05/https-crippling-attack-threatens-tens-of-thousands-of-web-and-mail-servers/</a></p>
<p>Tens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found.</p>
<p>The vulnerability affects an estimated 8.4 percent of the top one million websites and a slightly bigger percentage of mail servers populating the IPv4 address space, the researchers said. The threat stems from a flaw in the transport layer security protocol that websites and mail servers use to establish encrypted connections with end users. The new attack, which its creators have dubbed Logjam, can be exploited against a subset of servers that support the widely used Diffie-Hellman key exchange, which allows two parties that have never met before to negotiate a secret key even though they&#8217;re communicating over an unsecured, public channel.</p>
<p>The weakness is the result of export restrictions the US government mandated in the 1990s on US developers who wanted their software to be used abroad. </p>
<p>&#8220;Logjam shows us once again why it&#8217;s a terrible idea to deliberately weaken cryptography, as the FBI and some in law enforcement are now calling for,&#8221;</p>
<p>It wasn&#8217;t supposed to be this way</p>
<p>Ironically, Diffie-Hellman is supposed to provide an additional layer of protection because it allows the two connected parties to constantly refresh the cryptographic key securing Web or e-mail sessions. The so-called perfect forward secrecy that Diffie-Hellman makes possible significantly increases the work of eavesdropping because attackers must obtain the key anew each time it changes, as opposed to only once with other encryption schemes, such as those based on RSA keys. Logjam is significant because it shows that ephemeral Diffie-Hellman—or DHE—can be fatal to TLS when the export-grade ciphers are supported. Logjam is reminiscent of the FREAK attack that also allowed attackers to downgrade HTTPS connections to 512-bit cryptography.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/03/04/freak-attack-on-https/comment-page-1/#comment-1371856</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 07 Apr 2015 07:41:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30493#comment-1371856</guid>
		<description><![CDATA[Farbod Faraji / Electronic Frontier Foundation:
New South Wales Attacks Researchers Who Found Internet Voting Vulnerabilities
https://www.eff.org/deeplinks/2015/04/new-south-wales-attacks-researchers-who-warned-internet-voting-vulnerabilities

A security flaw in New South Wales’ Internet voting system may have left as many as 66,000 votes vulnerable to interception and manipulation in a recent election, according to security researchers. Despite repeated assurances from the Electoral Commission that all Internet votes are “fully encrypted and safeguarded,” six days into online voting, Michigan Computer Science Professor J. Alex Halderman and University of Melbourne Research Fellow Vanessa Teague discovered a FREAK flaw that could allow an attacker to intercept votes and inject their own code to change those votes, all without leaving any trace of the manipulation.

But instead of taking the researchers’ message to heart, officials instead attacked the messengers.

The New South Wales (NSW) Internet voting system, iVote, was designed to make it easier for the disabled, residents not in NSW during voting hours, and rural residents 20 kilometers away from a polling location to vote. The problem is that the system was not ready to be one of the biggest online voting experiments in the world.

Sadly, NSW officials seemed more interested in protecting their reputations than the integrity of elections. They sharply criticized Halderman and Teague, rather than commending them, for their discovery of the FREAK attack vulnerability. 

Criticizing Halderman and Teague for identifying security flaws in an Internet voting system is like criticizing your friend for pointing out that the lock on your front door doesn’t work.

As Verified Voting notes: &quot;Current systems lack auditability; there’s no way to independently confirm their correct functioning and that the outcomes accurately reflect the will of the voters while maintaining voter privacy and the secret ballot.&quot;  Indeed, the researchers&#039; discovery was not the first indication that New South Wales was not ready for an Internet voting system.

Perhaps the Electoral Commission lashed out against Halderman and Teague because it has been forced to reckon with the potentially severe consequences of its flawed Internet voting system.]]></description>
		<content:encoded><![CDATA[<p>Farbod Faraji / Electronic Frontier Foundation:<br />
New South Wales Attacks Researchers Who Found Internet Voting Vulnerabilities<br />
<a href="https://www.eff.org/deeplinks/2015/04/new-south-wales-attacks-researchers-who-warned-internet-voting-vulnerabilities" rel="nofollow">https://www.eff.org/deeplinks/2015/04/new-south-wales-attacks-researchers-who-warned-internet-voting-vulnerabilities</a></p>
<p>A security flaw in New South Wales’ Internet voting system may have left as many as 66,000 votes vulnerable to interception and manipulation in a recent election, according to security researchers. Despite repeated assurances from the Electoral Commission that all Internet votes are “fully encrypted and safeguarded,” six days into online voting, Michigan Computer Science Professor J. Alex Halderman and University of Melbourne Research Fellow Vanessa Teague discovered a FREAK flaw that could allow an attacker to intercept votes and inject their own code to change those votes, all without leaving any trace of the manipulation.</p>
<p>But instead of taking the researchers’ message to heart, officials instead attacked the messengers.</p>
<p>The New South Wales (NSW) Internet voting system, iVote, was designed to make it easier for the disabled, residents not in NSW during voting hours, and rural residents 20 kilometers away from a polling location to vote. The problem is that the system was not ready to be one of the biggest online voting experiments in the world.</p>
<p>Sadly, NSW officials seemed more interested in protecting their reputations than the integrity of elections. They sharply criticized Halderman and Teague, rather than commending them, for their discovery of the FREAK attack vulnerability. </p>
<p>Criticizing Halderman and Teague for identifying security flaws in an Internet voting system is like criticizing your friend for pointing out that the lock on your front door doesn’t work.</p>
<p>As Verified Voting notes: &#8220;Current systems lack auditability; there’s no way to independently confirm their correct functioning and that the outcomes accurately reflect the will of the voters while maintaining voter privacy and the secret ballot.&#8221;  Indeed, the researchers&#8217; discovery was not the first indication that New South Wales was not ready for an Internet voting system.</p>
<p>Perhaps the Electoral Commission lashed out against Halderman and Teague because it has been forced to reckon with the potentially severe consequences of its flawed Internet voting system.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/03/04/freak-attack-on-https/comment-page-1/#comment-1360783</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 20 Mar 2015 13:18:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30493#comment-1360783</guid>
		<description><![CDATA[OpenSSL patch has 14 fixes including two biggies, but no Heartbleed
But quick patching is still essential 
http://www.theinquirer.net/inquirer/news/2400597/openssl-gets-patch-for-mysterious-high-severity-issue

DETAILS ARE STARTING to emerge about the scope of vulnerability updates in the latest patch for the OpenSSL protocol, released without notice or details yesterday, despite some vulnerabilities being marked as &quot;high severity&quot;.

The first (CVE-2015-0291) could allow a denial-of-service attack to take place, said OpenSSL.

&quot;If a client connects to an OpenSSL 1.0.2 server and renegotiates with an invalid signature algorithms extension a NULL pointer dereference will occur. This can be exploited in a DoS attack against the server,&quot; it said.

The second (CVE-2015-0204) relates to the FREAK flaw that has recently been doing the rounds. Originally it had been classed as low, but then it was decided that &quot;recent studies have shown that RSA export cipher suites support is far more common&quot;.

OpenSSL (Secure Socket Layer) is a widely used standard for encrypting traffic between websites and servers.

Fixes for OpenSSL versions 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf will be released today

Forthcoming OpenSSL releases
http://marc.info/?l=openssl-announce&amp;m=142653572011212&amp;w=2]]></description>
		<content:encoded><![CDATA[<p>OpenSSL patch has 14 fixes including two biggies, but no Heartbleed<br />
But quick patching is still essential<br />
<a href="http://www.theinquirer.net/inquirer/news/2400597/openssl-gets-patch-for-mysterious-high-severity-issue" rel="nofollow">http://www.theinquirer.net/inquirer/news/2400597/openssl-gets-patch-for-mysterious-high-severity-issue</a></p>
<p>DETAILS ARE STARTING to emerge about the scope of vulnerability updates in the latest patch for the OpenSSL protocol, released without notice or details yesterday, despite some vulnerabilities being marked as &#8220;high severity&#8221;.</p>
<p>The first (CVE-2015-0291) could allow a denial-of-service attack to take place, said OpenSSL.</p>
<p>&#8220;If a client connects to an OpenSSL 1.0.2 server and renegotiates with an invalid signature algorithms extension a NULL pointer dereference will occur. This can be exploited in a DoS attack against the server,&#8221; it said.</p>
<p>The second (CVE-2015-0204) relates to the FREAK flaw that has recently been doing the rounds. Originally it had been classed as low, but then it was decided that &#8220;recent studies have shown that RSA export cipher suites support is far more common&#8221;.</p>
<p>OpenSSL (Secure Socket Layer) is a widely used standard for encrypting traffic between websites and servers.</p>
<p>Fixes for OpenSSL versions 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf will be released today</p>
<p>Forthcoming OpenSSL releases<br />
<a href="http://marc.info/?l=openssl-announce&#038;m=142653572011212&#038;w=2" rel="nofollow">http://marc.info/?l=openssl-announce&#038;m=142653572011212&#038;w=2</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/03/04/freak-attack-on-https/comment-page-1/#comment-1359377</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 18 Mar 2015 15:52:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30493#comment-1359377</guid>
		<description><![CDATA[HTTPS-crippling FREAK exploit affects thousands of Android and iOS apps
Attackers can use FREAK to steal passwords for finance, shopping, or medical apps.
http://arstechnica.com/security/2015/03/https-crippling-freak-exploit-hits-thousands-of-android-and-ios-apps/

While almost all the attention paid to the HTTPS-crippling FREAK vulnerability has focused on browsers, consider this: thousands of Android and iOS apps, many with finance, shopping, and medical uses, are also vulnerable to the same exploit that decrypts passwords, credit card details, and other sensitive data sent between handsets and Internet servers.

Security researchers from FireEye recently examined the most popular apps on Google Play and the Apple App Store and found 1,999 titles that left users wide open to the encryption downgrade attack. Specifically, 1,228 Android apps with one million or more downloads were vulnerable, while 771 out of the top 14,079 iOS apps were susceptible. Vulnerable apps were those that used—or in the case of iOS, could use—an affected crypto library and connected to servers that offered weak, 512-bit encryption keys. The number of vulnerable apps would no doubt mushroom when analyzing slightly less popular titles.

When these servers connect to vulnerable end-user devices, attackers with the ability to monitor a connection—say someone on an unsecured Wi-Fi network or a rogue employee at an Internet service provider—can capitalize on the vulnerability. By injecting malicious packets into the flow, the attacker can first cause the two parties to use a weak 512-bit encryption key while negotiating encrypted Web sessions. The adversary can then collect some of the resulting exchange and use cloud-based computing from Amazon or other services to factor the website&#039;s underlying private key. From that point on, the attacker can masquerade as the official website, a coup that allows the data to be read or modified as it passes between the site and the end user over the unsecured network.]]></description>
		<content:encoded><![CDATA[<p>HTTPS-crippling FREAK exploit affects thousands of Android and iOS apps<br />
Attackers can use FREAK to steal passwords for finance, shopping, or medical apps.<br />
<a href="http://arstechnica.com/security/2015/03/https-crippling-freak-exploit-hits-thousands-of-android-and-ios-apps/" rel="nofollow">http://arstechnica.com/security/2015/03/https-crippling-freak-exploit-hits-thousands-of-android-and-ios-apps/</a></p>
<p>While almost all the attention paid to the HTTPS-crippling FREAK vulnerability has focused on browsers, consider this: thousands of Android and iOS apps, many with finance, shopping, and medical uses, are also vulnerable to the same exploit that decrypts passwords, credit card details, and other sensitive data sent between handsets and Internet servers.</p>
<p>Security researchers from FireEye recently examined the most popular apps on Google Play and the Apple App Store and found 1,999 titles that left users wide open to the encryption downgrade attack. Specifically, 1,228 Android apps with one million or more downloads were vulnerable, while 771 out of the top 14,079 iOS apps were susceptible. Vulnerable apps were those that used—or in the case of iOS, could use—an affected crypto library and connected to servers that offered weak, 512-bit encryption keys. The number of vulnerable apps would no doubt mushroom when analyzing slightly less popular titles.</p>
<p>When these servers connect to vulnerable end-user devices, attackers with the ability to monitor a connection—say someone on an unsecured Wi-Fi network or a rogue employee at an Internet service provider—can capitalize on the vulnerability. By injecting malicious packets into the flow, the attacker can first cause the two parties to use a weak 512-bit encryption key while negotiating encrypted Web sessions. The adversary can then collect some of the resulting exchange and use cloud-based computing from Amazon or other services to factor the website&#8217;s underlying private key. From that point on, the attacker can masquerade as the official website, a coup that allows the data to be read or modified as it passes between the site and the end user over the unsecured network.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/03/04/freak-attack-on-https/comment-page-1/#comment-1359186</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 18 Mar 2015 11:22:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30493#comment-1359186</guid>
		<description><![CDATA[Sensitive apps with 6.3 BILLION downloads found open to FREAK
Banking, medical, and privacy apps join shoddy cipher list
http://www.theregister.co.uk/2015/03/18/freaky_apps_litter_top_spots_in_apple_android_app_stores/

Thousands of Android and Apple apps could lose sensitive financial and privacy data through exposure to the FREAK vulnerability, researchers say.

The FREAK (Factoring RSA Export Keys) attack allowed sensitive data to be stolen before encrypted connections are secured by requesting weak export-grade 512-bit RSA keys.

FireEye researchers Yulong Zhang, Hui Xue, Tao Wei, and Zhaofeng Chen crawled the app stores and found 1228 Android offerings vulnerable to FREAK.

The apps had been downloaded 6.3 billion times in total.

&quot;After scanning 10,985 popular Google Play Android apps with more than 1 million downloads each, we found 1228 of them are vulnerable to a FREAK attack because they use a vulnerable OpenSSL library to connect to vulnerable HTTPS servers,&quot; the team wrote in a report.

&quot;An attacker may launch a FREAK attack using man-in-the-middle techniques to intercept and modify the encrypted traffic between the mobile app and backend server.

&quot;The attacker can do this using well-known techniques such as ARP spoofing or DNS hijacking. Without necessarily breaking the encryption in real time, the attacker can record weakly encrypted network traffic, decrypt it and access the sensitive information inside.&quot;

They found 771 popular Apple apps of a pool of 14,079 were vulnerable on iOS versions below 8.2. 

FREAK Out on Mobile
https://www.fireeye.com/blog/threat-research/2015/03/freak_out_on_mobile.html

Recent disclosure of the FREAK attack [1] raises security concerns on TLS implementations once again after Heartbleed [2]. However, freakattack.com devotes client-side security checks to various browsers only. In this blog, we examine iOS and Android apps for their security status against FREAK attacks as clients.]]></description>
		<content:encoded><![CDATA[<p>Sensitive apps with 6.3 BILLION downloads found open to FREAK<br />
Banking, medical, and privacy apps join shoddy cipher list<br />
<a href="http://www.theregister.co.uk/2015/03/18/freaky_apps_litter_top_spots_in_apple_android_app_stores/" rel="nofollow">http://www.theregister.co.uk/2015/03/18/freaky_apps_litter_top_spots_in_apple_android_app_stores/</a></p>
<p>Thousands of Android and Apple apps could lose sensitive financial and privacy data through exposure to the FREAK vulnerability, researchers say.</p>
<p>The FREAK (Factoring RSA Export Keys) attack allowed sensitive data to be stolen before encrypted connections are secured by requesting weak export-grade 512-bit RSA keys.</p>
<p>FireEye researchers Yulong Zhang, Hui Xue, Tao Wei, and Zhaofeng Chen crawled the app stores and found 1228 Android offerings vulnerable to FREAK.</p>
<p>The apps had been downloaded 6.3 billion times in total.</p>
<p>&#8220;After scanning 10,985 popular Google Play Android apps with more than 1 million downloads each, we found 1228 of them are vulnerable to a FREAK attack because they use a vulnerable OpenSSL library to connect to vulnerable HTTPS servers,&#8221; the team wrote in a report.</p>
<p>&#8220;An attacker may launch a FREAK attack using man-in-the-middle techniques to intercept and modify the encrypted traffic between the mobile app and backend server.</p>
<p>&#8220;The attacker can do this using well-known techniques such as ARP spoofing or DNS hijacking. Without necessarily breaking the encryption in real time, the attacker can record weakly encrypted network traffic, decrypt it and access the sensitive information inside.&#8221;</p>
<p>They found 771 popular Apple apps of a pool of 14,079 were vulnerable on iOS versions below 8.2. </p>
<p>FREAK Out on Mobile<br />
<a href="https://www.fireeye.com/blog/threat-research/2015/03/freak_out_on_mobile.html" rel="nofollow">https://www.fireeye.com/blog/threat-research/2015/03/freak_out_on_mobile.html</a></p>
<p>Recent disclosure of the FREAK attack [1] raises security concerns on TLS implementations once again after Heartbleed [2]. However, freakattack.com devotes client-side security checks to various browsers only. In this blog, we examine iOS and Android apps for their security status against FREAK attacks as clients.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/03/04/freak-attack-on-https/comment-page-1/#comment-1358646</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 17 Mar 2015 16:56:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30493#comment-1358646</guid>
		<description><![CDATA[Researchers find same RSA encryption key used 28,000 timer
http://www.itworld.com/article/2897775/researchers-find-same-rsa-encryption-key-used-28000-times.html

What if the key to your house was shared with 28,000 other homes?

That’s essentially what researchers with Royal Holloway of the University of London discovered last week while scanning the Internet to see how many servers and devices are still vulnerable to the Web security flaw known as “FREAK.”

They found that 9.7 percent of nearly 23 million hosts, or around 2.2 million, are still accepting 512-bit keys, a surprising number considering the seriousness of FREAK and that more than two weeks has passed since it was made public.

In one egregious example, 28,394 routers running a SSL VPN module all use the same 512-bit public RSA key.

That never should have happened. 

The process for generating good, random prime numbers for public keys takes some effort, however. Software in devices such as routers need to have a good source of random bits in order to generate unique primes, which they often don’t, Paterson said.

What likely happened is that a manufacturer generated one key and then installed it on many, many devices.

“That’s just laziness on the part of a manufacturer,” Paterson said in a phone interview. “This is cardinal sin. This is just not how cryptography should be done.”

The danger is that an attacker could factor just one, 512-bit key and then potentially decrypt traffic exchanged by more than 28,000 devices that use the same key.]]></description>
		<content:encoded><![CDATA[<p>Researchers find same RSA encryption key used 28,000 timer<br />
<a href="http://www.itworld.com/article/2897775/researchers-find-same-rsa-encryption-key-used-28000-times.html" rel="nofollow">http://www.itworld.com/article/2897775/researchers-find-same-rsa-encryption-key-used-28000-times.html</a></p>
<p>What if the key to your house was shared with 28,000 other homes?</p>
<p>That’s essentially what researchers with Royal Holloway of the University of London discovered last week while scanning the Internet to see how many servers and devices are still vulnerable to the Web security flaw known as “FREAK.”</p>
<p>They found that 9.7 percent of nearly 23 million hosts, or around 2.2 million, are still accepting 512-bit keys, a surprising number considering the seriousness of FREAK and that more than two weeks has passed since it was made public.</p>
<p>In one egregious example, 28,394 routers running a SSL VPN module all use the same 512-bit public RSA key.</p>
<p>That never should have happened. </p>
<p>The process for generating good, random prime numbers for public keys takes some effort, however. Software in devices such as routers need to have a good source of random bits in order to generate unique primes, which they often don’t, Paterson said.</p>
<p>What likely happened is that a manufacturer generated one key and then installed it on many, many devices.</p>
<p>“That’s just laziness on the part of a manufacturer,” Paterson said in a phone interview. “This is cardinal sin. This is just not how cryptography should be done.”</p>
<p>The danger is that an attacker could factor just one, 512-bit key and then potentially decrypt traffic exchanged by more than 28,000 devices that use the same key.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/03/04/freak-attack-on-https/comment-page-1/#comment-1358408</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 17 Mar 2015 11:28:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30493#comment-1358408</guid>
		<description><![CDATA[Pub O&#039;clock probe finds thousands of repeated 512-bit RSA keys
FREAK-finding expedition finds one key on 28,000 hosts … who sells this rubbish?
http://www.theregister.co.uk/2015/03/17/freakscan_turns_up_thousands_of_repeated_512bit_rsa_keys/

Four researchers, a zmap scan and a Friday afternoon have shown that while sys admins are cleaning the FREAK bug out of their Web servers, broadband routers remain a perpetual feast.

The boffins from Royal Holloway at the University of London – Martin Albrecht, Davide Papini, Kenneth Paterson and Ricardo Villanueva-Polanco – started with a scan of the IPv4 address space using zmap, to see how many TLS-supporting servers could still be asked to dip back to 512-bit ciphers.

“Of 22,730,626 hosts supporting TLS that we discovered, 2,215,504 offered export-grade RSA keys (all at 512 bits) when probed”, their paper states – a vulnerability rate which is lower than that reported when FREAK was first discovered.

That&#039;s a good thing, since it suggests that sysadmins have been turning off support for “export-grade” encryption since FREAK was first discovered.

That&#039;s also where the good news from the study ends, though, because the researchers made the stunning discovery that there are “large clusters of repeated moduli” – in other words, that some 512-bit RSA keys out there are repeated.

In the case of the key that turned up more than 28,000 times, the researchers say it was associated with an unnamed broadband router with an SSL VPN module – in other words, Vulture South guesses, we&#039;re talking about the persistent stupidity among vendors of generating a single key and hard-coding it into the device.

Such vulnerabilities are not surprising to anyone familiar with the security of home-grade equipment - merely depressing.

Broadband routers: SOHOpeless and vendors don&#039;t care
Basic net access device in millions of homes is an insult to IT
http://www.theregister.co.uk/2015/03/05/broadband_routers_sohopeless_and_vendors_dont_care/]]></description>
		<content:encoded><![CDATA[<p>Pub O&#8217;clock probe finds thousands of repeated 512-bit RSA keys<br />
FREAK-finding expedition finds one key on 28,000 hosts … who sells this rubbish?<br />
<a href="http://www.theregister.co.uk/2015/03/17/freakscan_turns_up_thousands_of_repeated_512bit_rsa_keys/" rel="nofollow">http://www.theregister.co.uk/2015/03/17/freakscan_turns_up_thousands_of_repeated_512bit_rsa_keys/</a></p>
<p>Four researchers, a zmap scan and a Friday afternoon have shown that while sys admins are cleaning the FREAK bug out of their Web servers, broadband routers remain a perpetual feast.</p>
<p>The boffins from Royal Holloway at the University of London – Martin Albrecht, Davide Papini, Kenneth Paterson and Ricardo Villanueva-Polanco – started with a scan of the IPv4 address space using zmap, to see how many TLS-supporting servers could still be asked to dip back to 512-bit ciphers.</p>
<p>“Of 22,730,626 hosts supporting TLS that we discovered, 2,215,504 offered export-grade RSA keys (all at 512 bits) when probed”, their paper states – a vulnerability rate which is lower than that reported when FREAK was first discovered.</p>
<p>That&#8217;s a good thing, since it suggests that sysadmins have been turning off support for “export-grade” encryption since FREAK was first discovered.</p>
<p>That&#8217;s also where the good news from the study ends, though, because the researchers made the stunning discovery that there are “large clusters of repeated moduli” – in other words, that some 512-bit RSA keys out there are repeated.</p>
<p>In the case of the key that turned up more than 28,000 times, the researchers say it was associated with an unnamed broadband router with an SSL VPN module – in other words, Vulture South guesses, we&#8217;re talking about the persistent stupidity among vendors of generating a single key and hard-coding it into the device.</p>
<p>Such vulnerabilities are not surprising to anyone familiar with the security of home-grade equipment &#8211; merely depressing.</p>
<p>Broadband routers: SOHOpeless and vendors don&#8217;t care<br />
Basic net access device in millions of homes is an insult to IT<br />
<a href="http://www.theregister.co.uk/2015/03/05/broadband_routers_sohopeless_and_vendors_dont_care/" rel="nofollow">http://www.theregister.co.uk/2015/03/05/broadband_routers_sohopeless_and_vendors_dont_care/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/03/04/freak-attack-on-https/comment-page-1/#comment-1356632</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 13 Mar 2015 08:32:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30493#comment-1356632</guid>
		<description><![CDATA[Cisco FREAKs out, starts epic OpenSSL bug-splat
Happy weekend, network admins
http://www.theregister.co.uk/2015/03/13/cisco_freaks_out_starts_epic_openssl_bugsplat/

Cisco admins will be watching and waiting for fixes, with the company announcing that many of its OpenSSL implementations are carrying a bunch of post-POODLE fleas.

The list includes the notorious “FREAK” bug – CVE-2015-0204 – and Cisco&#039;s advisory contains an exhaustive list of products vulnerable, not vulnerable, and still under investigation.]]></description>
		<content:encoded><![CDATA[<p>Cisco FREAKs out, starts epic OpenSSL bug-splat<br />
Happy weekend, network admins<br />
<a href="http://www.theregister.co.uk/2015/03/13/cisco_freaks_out_starts_epic_openssl_bugsplat/" rel="nofollow">http://www.theregister.co.uk/2015/03/13/cisco_freaks_out_starts_epic_openssl_bugsplat/</a></p>
<p>Cisco admins will be watching and waiting for fixes, with the company announcing that many of its OpenSSL implementations are carrying a bunch of post-POODLE fleas.</p>
<p>The list includes the notorious “FREAK” bug – CVE-2015-0204 – and Cisco&#8217;s advisory contains an exhaustive list of products vulnerable, not vulnerable, and still under investigation.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/03/04/freak-attack-on-https/comment-page-1/#comment-1355448</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 11 Mar 2015 07:55:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30493#comment-1355448</guid>
		<description><![CDATA[Apple Fixes FREAK Bug, iCloud Flaw in iOS 8.2
https://threatpost.com/apple-fixes-freak-bug-icloud-flaw-in-ios-8-2/111553]]></description>
		<content:encoded><![CDATA[<p>Apple Fixes FREAK Bug, iCloud Flaw in iOS 8.2<br />
<a href="https://threatpost.com/apple-fixes-freak-bug-icloud-flaw-in-ios-8-2/111553" rel="nofollow">https://threatpost.com/apple-fixes-freak-bug-icloud-flaw-in-ios-8-2/111553</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/03/04/freak-attack-on-https/comment-page-1/#comment-1355443</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 11 Mar 2015 07:51:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30493#comment-1355443</guid>
		<description><![CDATA[Michael Mimoso / Threatpost:
Microsoft Patches Old Stuxnet Bug, FREAK Vulnerability
https://threatpost.com/microsoft-patches-old-stuxnet-bug-freak-vulnerability/111565

Windows IT shops figure to be in for some scrambling today. Not only was it revealed that a five-year-old patch for a vulnerability exploited by Stuxnet was incomplete and machines have been exposed since 2010, but today is also Patch Tuesday and the updated Stuxnet patch is one of 14 bulletins released by Microsoft. 

Five of the bulletins are rated critical by Microsoft, and include another Internet Explorer rollup and a patch for the recently disclosed FREAK attack.]]></description>
		<content:encoded><![CDATA[<p>Michael Mimoso / Threatpost:<br />
Microsoft Patches Old Stuxnet Bug, FREAK Vulnerability<br />
<a href="https://threatpost.com/microsoft-patches-old-stuxnet-bug-freak-vulnerability/111565" rel="nofollow">https://threatpost.com/microsoft-patches-old-stuxnet-bug-freak-vulnerability/111565</a></p>
<p>Windows IT shops figure to be in for some scrambling today. Not only was it revealed that a five-year-old patch for a vulnerability exploited by Stuxnet was incomplete and machines have been exposed since 2010, but today is also Patch Tuesday and the updated Stuxnet patch is one of 14 bulletins released by Microsoft. </p>
<p>Five of the bulletins are rated critical by Microsoft, and include another Internet Explorer rollup and a patch for the recently disclosed FREAK attack.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
