FREAK SSL/TLS Vulnerability for ios/osx/android

Essence_of_War

Platinum Member
Feb 21, 2013
2,650
4
81
http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html
Back in the early 1990s when SSL was first invented at Netscape Corporation, the United States maintained a rigorous regime of export controls for encryption systems. In order to distribute crypto outside of the U.S., companies were required to deliberately 'weaken' the strength of encryption keys. For RSA encryption, this implied a maximum allowed key length of 512 bits.​
This story has a happy ending, after a fashion. The U.S eventually lifted the most onerous of its export policies. Unfortunately, the EXPORT ciphersuites didn't go away. Today they live on like zombies -- just waiting to eat our flesh.
You see, it turns out that some modern TLS clients -- including Apple's SecureTransport and OpenSSL -- have a bug in them. This bug causes them to accept RSA export-grade keys even when the client didn't ask for export-grade RSA. The impact of this bug can be quite nasty: it admits a 'man in the middle' attack whereby an active attacker can force down the quality of a connection, provided that the client is vulnerable and the server supports export RSA.​
You see, it turns out that generating fresh RSA keys is a bit costly. So modern web servers don't do it for every single connection. In fact, Apache mod_ssl by default will generate a single export-grade RSA key when the server starts up, and will simply re-use that key for the lifetime of that server.

What this means is that you can obtain that RSA key once, factor it, and break every session you can get your 'man in the middle' mitts on until the server goes down. And that's the ballgame.​
The original backdoor. Back to collectively haunt us ~20 years later. OpenSSL has patched this so up-to-date linux desktop/laptop is probably OK. Android, ios, and osx have not and a large number of SSL/TLS websites could be transmitting effectively in plaintext. Windows is currently unclear.
 

cabri

Diamond Member
Nov 3, 2012
3,616
1
81
Windows has now been determined to be vulnerable also

Link

Microsoft on Thursday confirmed that Windows was vulnerable to FREAK attacks, and researchers changed their tune, saying Internet Explorer (IE) users were at risk.

By adding Windows to the list, the number of jeopardized users jumped dramatically: Windows powered 92% of all personal computers last month.

In a security advisory released Thursday, Microsoft said Windows was, in fact, vulnerable to FREAK (Factoring attack on RSA-EXPORT Keys).

"Microsoft is aware of a security feature bypass vulnerability in Secure Channel (Schannel) that affects all supported releases of Microsoft Windows," Microsoft said in the advisory. "Our investigation has verified that the vulnerability could allow an attacker to force the downgrading of the cipher suites used in an SSL/TLS connection on a Windows client system."

.. more
 

John Connor

Lifer
Nov 30, 2012
22,757
619
121
OpenSSL had Heartbleed and now this??? What's next? I know the audit team for the Truecrypt audit will audit SSL next. Be interesting to see what they find.