Breaking News

CORSAIR Unveils Platinum-rated HXi SHIFT PSUs with iCUE LINK System Hub and PCIe 5.1 support Panasonic Announces Limited Drop of LUMIX S9 Titanium Gold Edition Models in Europe be quiet! raises the bar with the new Dark Power 14 power supply series be quiet! elevates compact cooling with Pure Rock Slim 3 Toshiba First in Industry to Verify 12-Disk Stacking Technology for Hard Drives

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

LogJam Encryption Flaw Poses Risks For Web Surfers

LogJam Encryption Flaw Poses Risks For Web Surfers

Enterprise & IT May 20,2015 0

Security experts have discovered a new encryption flaw called LogJam, which is closely related to one found earlier this year that puts Web surfers' data at risk. LogJam can allow an attacker to weaken the encrypted connection between a user and a Web or email server. It actually attacks the TLS (Transport Layer Security) Protocol. The Logjam attack allows a man-in-the-middle attacker to downgrade vulnerable TLS connections to 512-bit export-grade cryptography. This allows the attacker to read and modify any data passed over the connection.

The attack is reminiscent of the FREAK (Factoring attack on RSA-EXPORT Keys) attack, which was revealed in March. However, LogJam is due to a flaw in the TLS protocol rather than an implementation vulnerability, and attacks a Diffie-Hellman key exchange rather than an RSA key exchange.

The attack affects any server that supports DHE_EXPORT ciphers, and affects all modern web browsers. 8.4% of the Top 1 Million domains were initially vulnerable.

Information on the flaw has been quietly circulating. Microsoft fixed its Internet Explorer browser last week, and patches for Firefox and Apple's Safari browser should be released soon.

What should you do?

If you have a web or mail server, you should disable support for export cipher suites and generate a unique 2048-bit Diffie-Hellman group. Step-by-step instrictions to deploy Diffie-Hellman for TLS are available here.

If you use SSH, you should upgrade both your server and client installations to the most recent version of OpenSSH, which prefers Elliptic-Curve Diffie-Hellman Key Exchange.

Web users make sure they have the most recent version of your browser installed, and check for updates frequently. Google Chrome (including Android Browser), Mozilla Firefox, Microsoft Internet Explorer, and Apple Safari are all deploying fixes for the Logjam attack.

Sysadmin or developers should make sure any TLS libraries they use are up-to-date and that they reject Diffie-Hellman Groups smaller than 1024-bit.

Tags:
Previous Post
NHK To Demonstrate 8K Super Hi-Vision Sattelite Broadcasting
Next Post
Imagination's OmniShield Enables Security For Mobile, Automotive or IoT

Related Posts

Latest News

CORSAIR Unveils Platinum-rated HXi SHIFT PSUs with iCUE LINK System Hub and PCIe 5.1 support
PC components

CORSAIR Unveils Platinum-rated HXi SHIFT PSUs with iCUE LINK System Hub and PCIe 5.1 support

Panasonic Announces Limited Drop of LUMIX S9 Titanium Gold Edition Models in Europe
Cameras

Panasonic Announces Limited Drop of LUMIX S9 Titanium Gold Edition Models in Europe

be quiet! raises the bar with the new Dark Power 14 power supply series
PC components

be quiet! raises the bar with the new Dark Power 14 power supply series

be quiet! elevates compact cooling with Pure Rock Slim 3
Cooling Systems

be quiet! elevates compact cooling with Pure Rock Slim 3

Toshiba First in Industry to Verify 12-Disk Stacking Technology for Hard Drives
Enterprise & IT

Toshiba First in Industry to Verify 12-Disk Stacking Technology for Hard Drives

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed