{"id":30288,"date":"2015-04-08T14:40:52","date_gmt":"2015-04-08T18:40:52","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/firefox-disables-opportunistic-encryption-to-fix-https-crippling-bug.php"},"modified":"2015-04-08T14:40:52","modified_gmt":"2015-04-08T18:40:52","slug":"firefox-disables-opportunistic-encryption-to-fix-https-crippling-bug","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/firefox-disables-opportunistic-encryption-to-fix-https-crippling-bug.php","title":{"rendered":"Firefox disables \u201copportunistic encryption\u201d to fix HTTPS-crippling bug"},"content":{"rendered":"<p><p>    The \"opportunistic encryption\" feature added to Firefox last    week has been disabled to fix a critical security bug that    allowed malicious websites to bypass HTTPS protections, Mozilla    officials said.  <\/p>\n<p>    Now, Mozilla developers have disabled opportunistic crypto in    the just-released Firefox 37.0.1 after they discovered that the    implementation released last week introduced a critical bug.    The vulnerability, which resides in functionality related to    opportunistic crypto, in some cases gave attackers an easy way    to present fake TLS certificates that wouldn't be detected by    the browser. The flaw in the HTTP    alternative services implemented in version 37 could be    triggered by a malicious website by embedding an \"Alt-Svc\"    header in the responses sent to vulnerable visitors. As a    result, warnings of invalid TLS certificates weren't displayed,    a shortcoming that allowed attackers with a man-in-the-middle    position to impersonate HTTPS-protected sites by replacing the    original certificate with their own forged credential.  <\/p>\n<p>    \"There was a Firefox implementation problem with Alt-Svc,\" Chad    Weiner, Mozilla's director of product management, wrote in a    statement sent to Ars. \"Opportunistic Encryption is a related,    but separate, feature that depends on Alt-Svc. Opportunistic    Encryption was disabled because of its use of Alt-Svc. We plan    to re-enable this feature once weve had time to fully    investigate the issue.\"  <\/p>\n<p>    Mozilla provided a bare-bones description of the vulnerability        here. In a     post published Tuesday, the Sophos Naked Security blog    offered a more thorough description of the bug and the risk it    posed:  <\/p>\n<p>      A security researcher worked out a way to bypass HTTPS      certificate validation if a web server redirected you via the      Alt-Svc header.    <\/p>\n<p>      That's very bad, and here's why.    <\/p>\n<p>      If you had a phishing site that pretended to be      yourbank.example, and handled HTTP connections      directly, you'd have difficulty presenting a      legitimate-looking connection.    <\/p>\n<p>      You'd either have to use HTTP and hope your victims wouldn't      notice the lack of a secure connection, or use HTTPS and hope      they wouldn't notice the certificate warnings telling them      that you probably weren't the lawful owner and operator of      the yourbank.example domain.    <\/p>\n<p>      Some users would probably end up getting tricked anyway, but      well-informed users ought to spot the ruse at once, and      remove themselves from harm's way.    <\/p>\n<p>      But this Alt-Svc bug could be used by crooks to      redirect victims to a secure connection (thus making the      connection \"look right\") without producing a certificate      warning to say that the site looked like an imposter.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/arstechnica.com\/security\/2015\/04\/firefox-disables-opportunistic-encryption-to-fix-https-crippling-bug\" title=\"Firefox disables \u201copportunistic encryption\u201d to fix HTTPS-crippling bug\">Firefox disables \u201copportunistic encryption\u201d to fix HTTPS-crippling bug<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The \"opportunistic encryption\" feature added to Firefox last week has been disabled to fix a critical security bug that allowed malicious websites to bypass HTTPS protections, Mozilla officials said. Now, Mozilla developers have disabled opportunistic crypto in the just-released Firefox 37.0.1 after they discovered that the implementation released last week introduced a critical bug. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-30288","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30288"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=30288"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30288\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=30288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=30288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=30288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}