{"id":30290,"date":"2015-04-08T14:41:00","date_gmt":"2015-04-08T18:41:00","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/mozilla-pushes-out-fix-for-firefox-opportunistic-encryption-flaw.php"},"modified":"2015-04-08T14:41:00","modified_gmt":"2015-04-08T18:41:00","slug":"mozilla-pushes-out-fix-for-firefox-opportunistic-encryption-flaw","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/mozilla-pushes-out-fix-for-firefox-opportunistic-encryption-flaw.php","title":{"rendered":"Mozilla pushes out fix for Firefox opportunistic encryption flaw"},"content":{"rendered":"<p><p>  Summary:The latest Firefox browser update has  created a web encryption security hole for hackers to exploit.<\/p>\n<\/p>\n<p>    Mozilla's Firefox has received a new update to patch a web    encryption flaw which could allow malicious websites to bypass    certificate verification checks.  <\/p>\n<p>    Last week, Mozilla introduced Firefox    37.0, which included support for HTTP\/2,    an Internet standard which allows for web connections to be    encrypted even when HTTPS is not supported. One feature is HTTP    Alternative Services -- otherwise known as Alt-Svc -- which    forces end-to-end encryption between pages through redirection    protocols.  <\/p>\n<p>    Alt-Svc communicates with your PC or mobile device, offering an    alternative way to access a web page. Instructions then can be    sent in order to perform \"opportunistic encryption,\" which    forces through basic encryption protocols when visiting a    website. It is not as secure as HTTPS, but is certainly an    improvement on today's HTTP, which is the most commonly used    communication channel on the Internet.  <\/p>\n<p>    Unfortunately, while the latest Firefox update was designed to    improve basic security, it also introduced a new, critical bug    which allowed a researcher to find a way to bypass certificate    verification if a web server redirected visitors through the    HTTP\/2 system.  <\/p>\n<p>    In a     basic security advisory provided by the Mozilla Foundation,    the security flaw was deemed \"critical.\" The bug, exploited    through the HTTP\/2 Alt-Svc header -- within Mozilla's    Alternative Services implementation -- allowed for SSL    certification verification to be bypassed.  <\/p>\n<p>    As a result, invalid SSL certificate warnings would not be    displayed and a hacker could potentially use a    man-in-the-middle (MITM) attack to impersonate legitimate    websites with the overall aim of luring victims to malicious    pages, which could then be used to steal data or deliver    malware payloads.  <\/p>\n<p>    Cyberattackers could, for example, hijack the connection which    looks legitimate thanks to Alt-Svc and send a victim to a    phishing site masquerading as their bank, and users may not    find anything amiss -- as invalid certificate warnings would    not be displayed.  <\/p>\n<p>    As reported by     the Sophos Naked Security team, the bug was rapidly    discovered and fixed. The team also noted that HTTP\/2 isn't yet    finalized and is not widely used. However, it is on its way to    adoption through support by web servers including Apache, Nginx    and Microsoft's IIS (Internet Information Servers) in Windows    10 Preview.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/zdnet.com.feedsportal.com\/c\/35462\/f\/675729\/s\/453553bf\/sc\/15\/l\/0L0Szdnet0N0Carticle0Cmozilla0Epushes0Eout0Efix0Efor0Efirefox0Eopportunistic0Eencryption0Eflaw0C0Tftag0FRSSbaffb68\/story01.htm\/RK=0\/RS=wxM3y6w.dXZ7201KJpznKJNJhYg-\" title=\"Mozilla pushes out fix for Firefox opportunistic encryption flaw\">Mozilla pushes out fix for Firefox opportunistic encryption flaw<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Summary:The latest Firefox browser update has created a web encryption security hole for hackers to exploit. Mozilla's Firefox has received a new update to patch a web encryption flaw which could allow malicious websites to bypass certificate verification checks. Last week, Mozilla introduced Firefox 37.0, which included support for HTTP\/2, an Internet standard which allows for web connections to be encrypted even when HTTPS is not supported. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-30290","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30290"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=30290"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30290\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=30290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=30290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=30290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}