iTnews
  • Home
  • News
  • Technology
  • Security

Major Australian banks vulnerable to DROWN SSLv2 flaw

By Juha Saarinen on Mar 2, 2016 4:56AM
Major Australian banks vulnerable to DROWN SSLv2 flaw

Disable SSLv2 everywhere to prevent decryption of communications.

The old and weak version two of the TLS/SSL protocol, which is still enabled on millions of servers around the world, has been found to be breakable using a vulnerability dubbed DROWN. 

DROWN stands for 'decrypting RSA with obsolete and weakened encryption'. It allows attackers to decrypt intercepted TLS communications if the 20-year-old SSLv2 protocol is supported on servers, a group of researchers has found. 

Furthermore, if servers' private keys are used on other servers that also allow SSLv2, they are also vulnerable to DROWN. This, the researchers said, is common as many companies reuse certificates and keys on, for example, web and email servers. 

Many Australian and New Zealand bank servers tested by the researchers in February this year showed up as being vulnerable to DROWN, making them vulnerable to eavesdropping. 

Around the world, several well-known internet properties including Buzzfeed, Yahoo, Alibaba, Weather.com, Flickr, Speedtest, Groupon, and more are currently vulnerable to DROWN. 

A list of DROWN-vulnerable Alexa top-10,000 sites was published by the researchers, who estimated that in total, a third of all HTTPS servers are affected by the flaw. 

Although the researchers are not aware of any current DROWN exploits, they suggest administrators take countermeasures now, as details of the vulnerability are published. 

According to the researchers, decrypting one out of 900 TLS connections requires around 40,000 probes, and 2^50 computation, the cost of which would be US$440 (A$613) on Amazon Web Services EC2 cloud for eight hours. 

A technical paper discussing the issue, DROWN: Breaking TLS using SSLv2 [pdf], has also been published. 

The researchers said US government policies that restricted export of strong cryptography in the late 1990s to make it easier for the National Security Agency to eavesdrop on communications contributed to DROWN. 

Three cryptographic primitives were deliberately weakened by the US government, including RSA encryption, the Diffie-Hellman key exchange protocol and the export-grade symmetric ciphers that DROWN exploits, the researchers said. 

This, the researchers said, demonstrates how deliberately weakened cryptography can come back and hurt internet security years later. 

To mitigate against DROWN, the open source OpenSSL cryptographic library will disable SSL version 2 by default from now on in the new versions 1.0.1s and 1.0.2g, and also remove the SSLv2 EXPORT ciphers. 

OpenSSL strongly recommends against using SSLv2 not just because of DROWN but other known deficiencies in the protocol. 

Another high severity vulnerability that affects OpenSSL versions prior to March last year allows for a "divide and conquer" key recovery attack was reported to the maintainers of the library in February. 

The defect has already been fixed in OpenSSL versions released on March 19 last year.  

In vulnerable versions, the flaw can be used to determine the SSLv2 master key with just 16 connections to a server, and with very little computational effort. 

This, in turn, makes the DROWN vulnerability more efficient, and effective against non-export cipher suites. 

Breaking the encryption by taking advantage of the older, vulnerable versions of OpenSSL would only require about a minute's worth of computational effort on a fast personal computer. 

Microsoft's Internet Information Services (IIS) server versions 7.0 and above have SSLv2 disabled by default, but the researchers advised admins to check if the private keys are used elsewhere as a precaution. 

The Network Security Services (NSS) cryptographic library starting with versions 3.13 from 2012 and higher also have SSLv2 disabled by default, but users who have enabled the older protocol manually should turn it off.  

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
drownopensslsecuritysslssl v2tls

Partner Content

Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Juha Saarinen
Mar 2 2016
4:56AM
0 Comments

Related Articles

  • OpenSSL squarely rooted by cert parsing bug
  • OpenSSL subject to remote memory corruption
  • Aruba, Avaya switches susceptible to remote takeover, patches on the way
  • Head over to the data centre and patch that UPS
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

NBN Co taking orders for 'non-premises' connections

NBN Co taking orders for 'non-premises' connections

Australian scientists build world's first quantum computer IC

Australian scientists build world's first quantum computer IC

Digital Nation

IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.