Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

SSL/TLS Suffers 'Bar Mitzvah Attack'
Dark Reading ^ | 3-26-2015 | Kelly Jackson Higgins

Posted on 03/26/2015 10:43:03 AM PDT by Citizen Zed

SSL/TLS encryption once again is being haunted by an outdated and weak feature long past its prime:  a newly discovered attack exploits a weakness in the older, less secure RC4 encryption algorithm option in SSL/TLS that's still supported in many browsers and servers.

Itsik Mantin, director of security research with Imperva, at Black Hat Asia in Singapore today will detail how an attacker could sniff credentials and other information during an SSL session in an attack he named the "Bar Mitzvah Attack" after 13-year-old weaknesses in the algorithm it abuses. The attack is a glaring reminder that the RC4 algorithm, long known to be breakable, should be put to rest once and for all, according to Mantin.

Bar Mitzvah exploits the weak keys used by RC4 and allows an attacker to recover plain text from the encrypted information, potentially exposing account credentials, credit card data, or other sensitive information. And unlike previous SSL hacks, this one doesn't require an active man-in-the-middle session, just passive sniffing or eavesdropping on SSL/TLS-encrypted connections, Mantin says.

(Excerpt) Read more at darkreading.com ...


TOPICS: Chit/Chat
KEYWORDS: computers; computing; internet
Be careful.
1 posted on 03/26/2015 10:43:03 AM PDT by Citizen Zed
[ Post Reply | Private Reply | View Replies]

To: Citizen Zed

Browsers and other apps ought to let you completely disable these older cyphers. If anyone is still using RC4 handshakes, I don’t want anything to do with them.


2 posted on 03/26/2015 11:20:06 AM PDT by zeugma ( The Clintons Could Find a Loophole in a Stop Sign)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Citizen Zed

I haven’t supported ARC4 in years....the weakest cipher I even bother with is Triple-DES...168 bits of security, 112 bits of actual entropy. (All three keys are independent of each other)

I use AES whenever possible...


3 posted on 03/26/2015 11:20:13 AM PDT by __rvx86 (¡SI SE PUEDE! (Cruz 2016!))
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

The main reason that these old protocols are still in use at all is to support the people still using ancient browsers like IE6.


4 posted on 03/26/2015 11:24:15 AM PDT by Sparticus (Tar and feathers for the next dumb@ss Republican that uses the word bipartisanship.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Sparticus
The main reason that these old protocols are still in use at all is to support the people still using ancient browsers like IE6.

Reason enough to finally break support for these old browsers for any SSL communications. IE6 has been a hack and bane to the internet for long enough.

5 posted on 03/26/2015 1:31:44 PM PDT by zeugma ( The Clintons Could Find a Loophole in a Stop Sign)
[ Post Reply | Private Reply | To 4 | View Replies]

To: zeugma

Yes! Especially given the fact that the vast majority of remaining IE6 users are in China using illicit copies of XP.


6 posted on 03/26/2015 1:36:10 PM PDT by Sparticus (Tar and feathers for the next dumb@ss Republican that uses the word bipartisanship.)
[ Post Reply | Private Reply | To 5 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson