Skip to main content

Here’s exactly why FREAK is such a dangerous exploit Read more: http://www.itproportal.com/2015/03/06/expert-analysis-freak-flaw/#ixzz3TnWm8b1i

http://www.itproportal.com/2015/03/06/expert-analysis-freak-flaw/

It was a case of another month, another flaw revelation this week.
Although we have seen zero-days in 2015 primarily affecting Adobe’s Flash software, this week a story picked up from the great threats of 2014 with 2015’s FREAK. The “Factoring attack on RSA-EXPORT Keys” flaw uses an encryption protocol from the early 1990s to intercept vulnerable clients and servers, and force them to use ‘export-grade’ cryptography, which can then be decrypted.
Matthew Green, cryptographer and research professor at Johns Hopkins University, explained that upon the invention of SSL in the early 1990s, the United States maintained a rigorous regime of export controls for encryption systems and in order to distribute crypto outside of the US, companies were required to deliberately ‘weaken’ the strength of encryption keys. 512 bit encryption was designed to ensure that the NSA would have the ability to ‘access’ communications, while allegedly providing crypto that was still ‘good enough’ for commercial use.
This ruling was eventually lifted, but the EXPORT ciphersuites remained and that is where the vulnerability remains. Patches are due from Apple and Google for their mobile browsers, but in the meantime cloud services and some websites remain vulnerable.
Following the revelations of the Heartbleed bug last year, I spoke with Veracode’s Chris Eng about one of the causes, which he identified as being because most software is not written entirely from scratch. “Only ten per cent of code is, and 90 per cent comes from other libraries and products, such as OpenSSL,” he said.
So in the case of FREAK, is this due to the same problem? How was this code allowed to remain in use since the early 1990s, and is this more example of the need for original, secure code to be created rather than using flaw-filled code sets?
Andrew Manoske, senior product manager at AlienVault, said that FREAK’s existence betrays some hard questions that apply far beyond crypto suites: should we re-invent the wheel by developing new software supposedly without the flaws of yesteryear? Or should we continue to use tried and tested libraries with the knowledge that there could be serious problems either with old exploitable bugs hidden within the software? Even then – when we’ve made our decision on what technology we should use – how far are we willing to go and how much are we willing to spend to enforce that decision?
He said: “The last question is the most pertinent for FREAK. The export key lengths exposed via the FREAK vulnerability have been considered insecure for some time now, and neither NIST nor NSA endorse their use given how easy it is to brute force such encryption.
“The expense of properly removing these now-insecure encryption schemes can be onerous – as evidenced in the decision by some software vendors not to patch to non-vulnerable versions of SSL and TLS.” He made the reference that “we’re okay with throwing the baby out with the bathwater as an industry, we’re not so great at cleaning the tub afterwards”.
Mark James, security specialist at ESET, said that using older code will always potentially pose security risks, as newer techniques are found to exploit or circumvent the very means we think are there to protect us.
“Using newer more secure code will often limit the time it takes to patch these problems, but as with any software it will always be at risk,” he said. “We will never have 100 per cent secure code and will always be playing cat and mouse between the good and bad guys.”
Likewise Rob Sobers, director of inbound marketing at Varonis, said that as long as there is software, there will be security vulnerabilities in software. He said: “The bug was allowed because nobody knew it was a bug until now. That’s just how software works. Sometimes you just need the right person at the right time with the right inputs to expose a vulnerability. The important thing is that once a vulnerability is disclosed, we fix it.”
The consensus seemed to be that this flaw is not as bad as Heartbleed, and even paled in comparison to Shellshock/Bashbug, and POODLE. This was mainly down to the technical expertise required to exploit the flaw, but the fact is that it exists and will likely remain to exist until it is patched everywhere and removed. Then we wait until the next great threat is announced, and start all over again.

Comments

Popular posts from this blog

The Difference Between LEGO MINDSTORMS EV3 Home Edition (#31313) and LEGO MINDSTORMS Education EV3 (#45544)

http://robotsquare.com/2013/11/25/difference-between-ev3-home-edition-and-education-ev3/ This article covers the difference between the LEGO MINDSTORMS EV3 Home Edition and LEGO MINDSTORMS Education EV3 products. Other articles in the ‘difference between’ series: * The difference and compatibility between EV3 and NXT ( link ) * The difference between NXT Home Edition and NXT Education products ( link ) One robotics platform, two targets The LEGO MINDSTORMS EV3 robotics platform has been developed for two different target audiences. We have home users (children and hobbyists) and educational users (students and teachers). LEGO has designed a base set for each group, as well as several add on sets. There isn’t a clear line between home users and educational users, though. It’s fine to use the Education set at home, and it’s fine to use the Home Edition set at school. This article aims to clarify the differences between the two product lines so you can decide which

Let’s ban PowerPoint in lectures – it makes students more stupid and professors more boring

https://theconversation.com/lets-ban-powerpoint-in-lectures-it-makes-students-more-stupid-and-professors-more-boring-36183 Reading bullet points off a screen doesn't teach anyone anything. Author Bent Meier Sørensen Professor in Philosophy and Business at Copenhagen Business School Disclosure Statement Bent Meier Sørensen does not work for, consult to, own shares in or receive funding from any company or organisation that would benefit from this article, and has no relevant affiliations. The Conversation is funded by CSIRO, Melbourne, Monash, RMIT, UTS, UWA, ACU, ANU, ASB, Baker IDI, Canberra, CDU, Curtin, Deakin, ECU, Flinders, Griffith, the Harry Perkins Institute, JCU, La Trobe, Massey, Murdoch, Newcastle, UQ, QUT, SAHMRI, Swinburne, Sydney, UNDA, UNE, UniSA, UNSW, USC, USQ, UTAS, UWS, VU and Wollongong.

Building a portable GSM BTS using the Nuand bladeRF, Raspberry Pi and YateBTS (The Definitive and Step by Step Guide)

https://blog.strcpy.info/2016/04/21/building-a-portable-gsm-bts-using-bladerf-raspberry-and-yatebts-the-definitive-guide/ Building a portable GSM BTS using the Nuand bladeRF, Raspberry Pi and YateBTS (The Definitive and Step by Step Guide) I was always amazed when I read articles published by some hackers related to GSM technology. H owever , playing with GSM technologies was not cheap until the arrival of Software Defined Radios (SDRs), besides not being something easy to be implemented. A fter reading various articles related to GSM BTS, I noticed that there were a lot of inconsistent and or incomplete information related to the topic. From this, I decided to write this article, detailing and describing step by step the building process of a portable and operational GSM BTS. Before starting with the “hands on”, I would like to thank all the pioneering Hackers and Researchers who started the studies related to previously closed GSM technology. In particul