Download presentation
Presentation is loading. Please wait.
Published byOlivia Hopkins Modified over 8 years ago
2
Can SSL and TOR be intercepted?
3
Secure Socket Layer
4
De-facto standard to encrypt communications Can ensure the identity of the peer
5
Prerequisite to decrypt a communication: You have to monitor it!
6
Most of the SSL attacks are MITM-based
7
Physically in the middle Rogue AP, ISP, etc.
8
Logically in the middle Take a look at our 2003 BlackHat presentation…
9
Ok but…can SSL be intercepted?
10
Three attacks’ categories
11
Protocol design and math Chain of trust The User
12
Let’s start with…
13
Protocol design and math
14
Weak encryption can be easily cracked Protocol and algorithms are negotiated during the handshake This “attack” can be performed passively
15
Weak encryption can be easily cracked ~ 70%* of the Internet uses only “strong” encryption What’s “weak” and what’s “easy”? Ask the NSA… * Trustworthy Internet Movement 2014/10/3 on 151.509 web sites
16
SSLv2 Downgrade Attack No integrity check on the handshake Weaker encryption algorithms can be forced
17
SSLv2 Downgrade Attack SSLv2 disabled by default on most systems
18
SSLv3 is vulnerable as well… POODLE attack recently published (September 2014) Can be used to decrypt HTTPS cookies TLS-to-SSLv3 fallback can be forced
19
SSLv3 is vulnerable as well… TLS_FALLBACK_SCSV mitigated fallback attack (Chrome, Opera) Browsers are going to dismiss SSLv3 (e.g.: Firefox34, Chrome40) Providers are going to dismiss SSLv3 (Facebook, Google, etc.)
20
SSL 2.0SSL 3.0TLS 1.0TLS 1.1TLS 1.2 Internet Explorer * Disabled Enabled Chrome 39DisabledEnabled Mozilla Firefox 33DisabledEnabled Opera 25DisabledEnabled Safari 8DisabledEnabled Browser coverage * Microsoft released a patch to disable SSL 3.0 on all versions of Internet Explorer
21
Protocol versionWebsite Support SSL 2.019.4% SSL 3.098.0% TLS 1.099.3% TLS 1.142.0% TLS 1.244.3% Website coverage
22
Implementation-specific attacks OpenSSL MITM attack (CVE-2014-0224) OpenSSL Heartbleed (CVE-2014-0160) And many others...
23
Implementation-specific attacks Keep your OpenSSL up to date! 95% of the Internet runs updated OpenSSL versions Google’s Nogotofail tests connections for known bugs and weak configurations
24
Chain of Trust
25
If you have the private key you can see the traffic! Very hard to detect This “attack” can be performed passively if no PFS is used Heartbleed attack could be used to get the key from the server
26
If you have the private key you can see the traffic! Don’t give your private key to anyone ;) Forward Secrecy available on almost 40% of the websites Heartbleed vulnerable sites are now close to 0%
27
Custom CA on the client device Often used by AVs to inspect traffic
28
Custom CA on the client device Don’t install untrusted CA certificates
29
Rogue CA A malicious CA can sign fake certificates CAs’ certificates were stolen in the past (eg: Diginotar 2011) Allows any “active” probe to impersonate any website
30
Rogue CA Public Key Pinning (Chrome, Firefox) EFF SSL Observatory monitors trusted CAs Google and Facebook actively searched for rogue CAs
31
Rogue CA In December 2013 0.2% of all connections to Facebook were established with forged certificates In 2014 Google found evidence from France and India of certificates signed by rogue CAs (government surveillance?)
32
Future alternatives to the Chain of Trust Trust Assertion for Certificate Keys DNS-based Authentication of Named Entities
33
The User
34
SSL Strip attack Intercept the “redirect to HTTPS” reply HTTP-to-HTTPS Proxy for the whole communication Replace HTTPS with HTTP in any link
35
SSL Strip attack Pay attention to the “lock” Servers using HSTS can force HTTPS on the clients HTTPS Everywhere plugin doesn’t allow HTTP connections
36
The Onion Router
37
De-facto standard to browse and publish content anonymously Less used alternatives are less anonymous (e.g.: I2P)
38
“Relay Early” Attack Aimed at monitoring clients and publishers of hidden services
39
“Relay Early” Attack Used malicious Entry Guard and HSDir nodes Sybil attack to gain reputation Traffic Confirmation attack to link the HS and the client IP address
40
“Relay Early” Attack Malicious nodes joined the network in January 2014 The attack was identified and blocked in July 2014 The author and the real impact are both still unknown
41
“Relay Early” Attack Presumably described in a BlackHat 2014 speech by Carnegie Mellon University researchers… …that was presumably blocked by some US agency* * any correlation with the takedown of Silk Road 2.0? ;)
42
“Relay Early” Attack This is just one of the possible attacks that involve controlling at least two nodes in a TOR circuit: Entry Guard & Exit Node Entry Guard & Rendezvous Point
43
“Relay Early” Attack The protocol has been patched to prevent this specific attack Similar attacks, based on statistical traffic analysis, can be mitigated but not prevented
44
The Snowden Affair NSA presumably uses several technologies targeting TOR Quantum, FoxAcid, etc.
45
The Snowden Affair TOR Client Exit Node Entry Guar d Quantum Website TOR Client Malicious Exit Node Entry Guar d Website
46
The Snowden Affair QuantumCookie injects malicious cookies to track targets’ browsing QuantumInsert inserts malicious code to exploit vulnerabilities inside the TOR browser
47
Executing arbitrary code allows complete target monitoring
48
Wanna see it in action? Come to our presentation this afternoon* *it could be not as cool as the NSA one ;)
49
Intruding personal devices with Remote Control System Ballroom A 13:30
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.