{"id":23706,"date":"2014-06-05T13:40:57","date_gmt":"2014-06-05T17:40:57","guid":{"rendered":"http:\/\/www.opensource.im\/?p=23706"},"modified":"2014-06-05T13:40:57","modified_gmt":"2014-06-05T17:40:57","slug":"heartbleed-redux-another-gaping-wound-in-web-encryption-uncovered","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/heartbleed-redux-another-gaping-wound-in-web-encryption-uncovered.php","title":{"rendered":"Heartbleed Redux: Another Gaping Wound In Web Encryption Uncovered"},"content":{"rendered":"<p><p>      Illustration: Ross      Patton\/WIRED    <\/p>\n<p>    The internet is still reeling from    the discovery of    the Heartbleed vulnerability, a software flaw exposed in    April that broke most implementations of the widely used    encryption protocol SSL. Now, before    Heartbleed has even fully healed, another major bug has    ripped off the scab.  <\/p>\n<p>    On Thursday, the OpenSSL    Foundation published an    advisory warning to users to update their SSL yet again,    this time to fix a previously unknown but more than decade-old    bug in the software that allows any network eavesdropper to    strip away its encryption. The non-profit foundation, whose    encryption is used by the majority of the Webs SSL servers,    issued a patch and advised sites that use its software to    upgrade immediately.  <\/p>\n<p>    The new attack, found by Japanese    researcher Masashi Kikuchi, takes advantage of a portion of    OpenSSLs handshake for establishing encrypted connections    known as ChangeCipherSpec, allowing the attacker to force the    PC and server performing the handshake to use weak keys that    allows a man-in-the-middle snoop to decrypt and read the    traffic.  <\/p>\n<p>    This vulnerability allows    malicious intermediate nodes to intercept encrypted data and    decrypt them while forcing SSL clients to use weak keys which    are exposed to the malicious nodes, reads an FAQ published by Kikuchis    employer, the software firm Lepidum. Ashkan Soltani, a    privacy researcher who has been involved in analyzing the    Snowden NSA leaks for the NSA and closely tracked SSLs woes,    offers this translation: Basically, as you and I are    establishing a secure connection, an attacker injects a command    that fools us to thinking were using a private password    whereas were actually using a public one.  <\/p>\n<p>    Unlike the Heartbleed flaw, which    allowed anyone to directly attack any server using OpenSSL, the    attacker exploiting this newly discovered bug would have to be    located somewhere between the two computers communicating. But    that still leaves open the possibility that anyone from an    eavesdropper on your local Starbucks network to the NSA to    strip away your Web connections encryption before its even    initialized.  <\/p>\n<p>    According to a     blog post by Kikuchi, the flaw has existed since the very    first release of OpenSSL in 1998. He argues that despite the    widespread dependence on the software and its recent scrutiny    following the Heartbleed revelation, OpenSSLs code still    hasnt received enough attention from security researchers.    The biggest reason why the bug hasnt been found for over 16    years is that code reviews were insufficient, especially from    experts who had experiences with TLS\/SSL implementation, he    writes. They could have detected the problem.  <\/p>\n<p>    The revelation of the bug on the    one-year anniversary of the Guardians first publication of    Snowdens NSA leaks adds to that grim lesson, says security    researcher Soltani. He points to efforts by privacy groups like    Reset The Net that    have used the Snowden revelations as inspiration to push    Internet users and companies to implement more pervasive    encryption. Those efforts are undermined, he points out, by the    fact that some of the oldest and most widely used encryption    protocols may still have fundamental flaws. There are huge    efforts by companies and activists to deploy tools that add    proven security, he says, quoting Reset The Nets    website. Yet theres very little actual work and support    of the underlying tools that are being deployed, like OpenSSL.    Its pretty shameful that the core library that practically the    entire internet relies on for transport security is maintained    by a handful of under-resourced engineers.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.wired.com\/c\/35185\/f\/661467\/s\/3b330b6e\/sc\/4\/l\/0L0Swired0N0C20A140C0A60Cheartbleed0Eredux0Eanother0Egaping0Ewound0Ein0Essl0Euncovered0C\/story01.htm\/RK=0\/RS=13UuXQBLgFf0nmV7symTSWw1Pxo-\" title=\"Heartbleed Redux: Another Gaping Wound In Web Encryption Uncovered\">Heartbleed Redux: Another Gaping Wound In Web Encryption Uncovered<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Illustration: Ross Patton\/WIRED The internet is still reeling from the discovery of the Heartbleed vulnerability, a software flaw exposed in April that broke most implementations of the widely used encryption protocol SSL. Now, before Heartbleed has even fully healed, another major bug has ripped off the scab. On Thursday, the OpenSSL Foundation published an advisory warning to users to update their SSL yet again, this time to fix a previously unknown but more than decade-old bug in the software that allows any network eavesdropper to strip away its encryption<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-23706","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/23706"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=23706"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/23706\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=23706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=23706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=23706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}