Welcome!

Blog Feed Post

Don’t DROWN in Misinformation

Before you go and try to fix a problem, it’s important to find out exactly what the problem is. This is something that seems to be getting harder and harder these days, especially when it comes to cryptography. Why am I bringing this up? One of the recent vulnerabilities splashing across the headlines, known as DROWN (which is a new attack on old encryption), seems to have a lot of misinformation surrounding it. My goal with this blog is to clear up two main points about DROWN that people seem to be getting wrong.

Inherent in this blog is a warning: Security is a thing now and people tend to get really excited about it, which means getting easily swept up in the media hype. What I’m saying is, when the next big vulnerability hits, don’t get caught up in it – at least not until you do your own research. Reading about it in blogs is fine, but make sure you follow up with their references and review the original disclosure.

Misconception 1: None of our clients user SSLv2

DROWN is an attack on SSL version 2, an old and busted protocol no one should use. If you’ve been on the receiving end of a Hurricane Labs pentest, it has probably shown up on your report somewhere as low severity (although it’s ranked a little higher now). It wasn’t a big deal because, well, SSL version 2 is old and no end users should be using it. In fact, it’s unlikely you even have a program on your computer that supports it.

The question floating around is: “If SSLv2 isn’t used, why should I care about its vulnerabilities?” Well, just because you don’t use SSLv2, doesn’t mean the attacker won’t. And they do. The availability of SSLv2 allows an attacker to replay (with some modifications) your fancy TLS 1.2 2048 bit RSA packets to the old and busted SSLv2 server and leverage this vulnerability to decrypt those packets.

That’s right – SSLv2 may’ve been broken before, but now it is SO broken that it even breaks the most modern crypto solution. At this point, your SSLv2 connections are likely working as a nice little service offering (that you’re providing) for attackers to exploit your strongest crypto.

Misconception 2: Attackers can compromise the “private key”

While researching this vulnerability, my colleagues and I came across quite a bit of contradictory information. This really surprised me. Sites I have trusted many times in the past seemed to have contradicted the very sources they reference… Some sources (even credible websites) claim that the DROWN attack allows an attacker to steal a server’s “private key”. I figured this was likely just a misunderstanding about what “private key” really means, but maybe I missed something.

In this context, “private key” is expected to mean the RSA private key. The RSA private key is EVERYTHING. If an attacker can get your private key, then he can decrypt new traffic, old traffic (excluding perfect forward secrecy), and even impersonate your web server. He essentially has a key to your house, which means you have to change your locks. However, changing your locks means time and money. Someone has to swap the current certificates with new ones, but those need to be generated by modern standards (no SHA1 hashing past January 2017), and signed by a certificate authority.

While changing your keys might be a good idea if your server is old enough to offer SSLv2, it turns out it’s not strictly necessary. The authors of the white paper explicitly address this in their FAQ. The DROWN attack can decrypt a TLS session, but can NOT steal your RSA private key.

In order to get to the bottom of this, I emailed one of the authors of the white paper. His email must be on fire right now having just released this vulnerability, but he was kind enough to reply to me very quickly, clearing up any confusion:

DROWN does not allow an attacker to extract a server’s private key, only to decrypt connections.
– Nimrod Aviram

Misconception 3: The “Special DROWN attack”

Due to the complexity of the DROWN attack, the simplified website DROWNattack.com was created so normal humans can wrap their minds around it. For the sake of understanding, the write-up focuses on the attack implications on SSLv2, which is the most significant result of the attack. However, the authors were able to drastically improve the feasibility of the attack by leveraging a flaw in the specific implementation of SSLv2 by OpenSSL. This is what the authors refer to as the “Special DROWN attack” and is found on page 9, section 5 of the paper.

How does the “Special DROWN attack” improve it? Well, it costs $440.00 to run an EC2 instance for 8 hours to perform the normal DROWN attack, while the improved version of the attack can be run on a common single core computer in less than a minute. This improves the feasibility, but additionally the implications, because the attack is now fast enough that it can be executed while the victim is performing the TLS handshake. This means that an attacker can become an active man-in-the-middle and modify the information you send to the server.

This, at first, may not seem significant because decrypting packets now, or 8 hours from now, still gets credentials that are likely active. However, with an active man-in-the-middle position, the attacker does have more power. An example of this is his ability to compromise a TLS session implementing perfect forward secrecy by impersonating the server during the Diffie-Hellman key exchange (find more about this here). The complexity of the previous sentence is a great illustration as to why the authors did not focus on this in the simple write-up.

As to the implementation flaw by OpenSSL, the white paper states:

“…it was unknowingly fixed on March 4, 2015 by a patch designed to correct an unrelated problem.”

So, the next time a big vulnerability hits, consider the information presented by many sources and weigh all claims based off of the original source for a better understanding.

Read the original blog entry...

More Stories By Hurricane Labs

Christina O’Neill has been working in the information security field for 3 years. She is a board member for the Northern Ohio InfraGard Members Alliance and a committee member for the Information Security Summit, a conference held once a year for information security and physical security professionals.

Latest Stories
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
This session will provide an introduction to Cloud driven quality and transformation and highlight the key features that comprise it. A perspective on the cloud transformation lifecycle, transformation levers, and transformation framework will be shared. At Cognizant, we have developed a transformation strategy to enable the migration of business critical workloads to cloud environments. The strategy encompasses a set of transformation levers across the cloud transformation lifecycle to enhance ...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
So the dumpster is on fire. Again. The site's down. Your boss's face is an ever-deepening purple. And you begin debating whether you should join the #incident channel or call an ambulance to deal with his impending stroke. Yes, we know this is a developer's fault. There's plenty of time for blame later. Postmortems have a macabre name because they were once intended to be Viking-like funerals for someone's job. But we're civilized now. Sort of. So we call them post-incident reviews. Fires are ne...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
CloudEXPO New York 2018, colocated with DevOpsSUMMIT and DXWorldEXPO New York 2018 will be held November 12-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI and Machine Learning to one location.
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, such as datacenter deployment, HPC, workstations, storage networks and standalone server installations. ICC has been in business for over 23 years and their phenomenal range of clients include multinational corporations, universities, and small busines...
This sixteen (16) hour course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Authorization of web applications developed in the cloud is a fundamental problem for security, yet companies often build solutions from scratch, which is error prone and impedes time to market. This talk shows developers how they can (instead) build on-top of community-owned projects and frameworks for better security.Whether you build software for enterprises, mobile, or internal microservices, security is important. Standards like SAML, OIDC, and SPIFFE help you solve identity and authenticat...
The digital transformation is real! To adapt, IT professionals need to transform their own skillset to become more multi-dimensional by gaining both depth and breadth of a wide variety of knowledge and competencies. Historically, while IT has been built on a foundation of specialty (or "I" shaped) silos, the DevOps principle of "shifting left" is opening up opportunities for developers, operational staff, security and others to grow their skills portfolio, advance their careers and become "T"-sh...