Download presentation
Presentation is loading. Please wait.
Published byCornelius Ward Modified over 9 years ago
2
Can SSL and TOR be intercepted?
3
Secure Socket Layer
4
De-facto standard to encrypt communications Can ensure the identity of the peer
5
Prerequisite to decrypt a communication: You have to monitor it!
6
Most of the SSL attacks are MITM-based
7
Physically in the middle Rogue AP, ISP, etc.
8
Logically in the middle Take a look at our 2003 BlackHat presentation…
9
Ok but…can SSL be intercepted?
10
Three attacks’ categories
11
Protocol design and math Chain of trust The User
12
Let’s start with…
13
Protocol design and math
14
Weak encryption can be easily cracked Protocol and algorithms are negotiated during the handshake This “attack” can be performed passively
15
Weak encryption can be easily cracked ~ 70%* of the Internet uses only “strong” encryption What’s “weak” and what’s “easy”? Ask the NSA… * Trustworthy Internet Movement 2014/10/3 on 151.509 web sites
16
SSLv2 Downgrade Attack No integrity check on the handshake Weaker encryption algorithms can be forced
17
SSLv2 Downgrade Attack SSLv2 disabled by default on most systems
18
SSLv3 is vulnerable as well… POODLE attack (September 2014) could be used to decrypt HTTPS cookies
19
SSLv3 is vulnerable as well… Most browsers dismissed SSLv3 Providers are going to dismiss it as well
20
Protocol versionWebsite Support SSL 2.019.4% SSL 3.098.0% TLS 1.099.3% TLS 1.142.0% TLS 1.244.3% Website coverage
21
TLS Logjam attack Published on May 2015 Forces TLS connection with weak key
22
TLS Logjam attack Vendors are patching
23
Implementation-specific attacks OpenSSL "Heartbleed" (CVE-2014-0160) Oracle Java JSSE (CVE-2014-6593) OpenSSL "Freak" (CVE-2015-0204) And many others...
24
Implementation-specific attacks Keep your system up to date! Google’s Nogotofail tests connections for known bugs and weak configurations
25
Chain of Trust
26
If you have the private key you can see the traffic! Very hard to detect This “attack” can be performed passively if no PFS is used
27
If you have the private key you can see the traffic! Don’t give your private key to anyone ;) Forward Secrecy available on almost 40% of the websites
28
Custom CA on the client device Often used by AVs to inspect traffic Sometimes used by vendors to insert Ads
29
Custom CA on the client device Don’t install untrusted CA certificates Keep your OS/AV up to date
30
Rogue CA A malicious CA can sign fake certificates CAs’ certificates were stolen in the past (eg: Diginotar 2011) Allows any “active” probe to impersonate any website
31
Rogue CA Public Key Pinning EFF SSL Observatory monitors trusted CAs Google and Facebook actively search for rogue CAs
32
Rogue CA In December 2013 0.2% of all connections to Facebook were established with forged certificates In 2014 Google found evidence from France and India of certificates signed by rogue Cas In 2015 Google removed all China NIC and EV CAs from their products
33
Future alternatives to the Chain of Trust Trust Assertion for Certificate Keys DNS-based Authentication of Named Entities
34
The User
35
SSL Strip attack Intercept the “redirect to HTTPS” reply HTTP-to-HTTPS Proxy for the whole communication Replace HTTPS with HTTP in any link
36
SSL Strip attack Pay attention to the “lock” Servers using HSTS can force HTTPS on the clients HTTPS Everywhere plugin doesn’t allow HTTP connections Mozilla pushes for full HTTPS
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.