Breaking News

LIAN LI Introduces the Platinum Certified SX PSU Series Micron Ships Automotive UFS 4.1 Apple introduces Digital ID DJI Launches Neo 2 PlayStation Plus Game Catalog for November 2025

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

LogJam Encryption Flaw Poses Risks For Web Surfers

LogJam Encryption Flaw Poses Risks For Web Surfers

Enterprise & IT May 20,2015 0

Security experts have discovered a new encryption flaw called LogJam, which is closely related to one found earlier this year that puts Web surfers' data at risk. LogJam can allow an attacker to weaken the encrypted connection between a user and a Web or email server. It actually attacks the TLS (Transport Layer Security) Protocol. The Logjam attack allows a man-in-the-middle attacker to downgrade vulnerable TLS connections to 512-bit export-grade cryptography. This allows the attacker to read and modify any data passed over the connection.

The attack is reminiscent of the FREAK (Factoring attack on RSA-EXPORT Keys) attack, which was revealed in March. However, LogJam is due to a flaw in the TLS protocol rather than an implementation vulnerability, and attacks a Diffie-Hellman key exchange rather than an RSA key exchange.

The attack affects any server that supports DHE_EXPORT ciphers, and affects all modern web browsers. 8.4% of the Top 1 Million domains were initially vulnerable.

Information on the flaw has been quietly circulating. Microsoft fixed its Internet Explorer browser last week, and patches for Firefox and Apple's Safari browser should be released soon.

What should you do?

If you have a web or mail server, you should disable support for export cipher suites and generate a unique 2048-bit Diffie-Hellman group. Step-by-step instrictions to deploy Diffie-Hellman for TLS are available here.

If you use SSH, you should upgrade both your server and client installations to the most recent version of OpenSSH, which prefers Elliptic-Curve Diffie-Hellman Key Exchange.

Web users make sure they have the most recent version of your browser installed, and check for updates frequently. Google Chrome (including Android Browser), Mozilla Firefox, Microsoft Internet Explorer, and Apple Safari are all deploying fixes for the Logjam attack.

Sysadmin or developers should make sure any TLS libraries they use are up-to-date and that they reject Diffie-Hellman Groups smaller than 1024-bit.

Tags:
Previous Post
NHK To Demonstrate 8K Super Hi-Vision Sattelite Broadcasting
Next Post
Imagination's OmniShield Enables Security For Mobile, Automotive or IoT

Related Posts

Latest News

LIAN LI Introduces the Platinum Certified SX PSU Series
PC components

LIAN LI Introduces the Platinum Certified SX PSU Series

Micron Ships Automotive UFS 4.1
Enterprise & IT

Micron Ships Automotive UFS 4.1

Apple introduces Digital ID
Enterprise & IT

Apple introduces Digital ID

DJI Launches Neo 2
Drones

DJI Launches Neo 2

PlayStation Plus Game Catalog for November 2025
Gaming

PlayStation Plus Game Catalog for November 2025

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed