Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Networking Security The Internet IT

SSL Pulse Project Finds Just 10% of SSL Sites Actually Secure 62

Trailrunner7 writes "A new project that was setup to monitor the quality and strength of the SSL implementations on top sites across the Internet found that 75 percent of them are vulnerable to the BEAST SSL attack and that just 10 percent of the sites surveyed should be considered secure. The SSL Pulse project, set up by the Trustworthy Internet Movement, looks at several components of each site's SSL implementation to determine how secure the site actually is. The project looks at how each site is configured, which versions of the TLS and SSL protocols the site supports, whether the site is vulnerable to the BEAST or insecure renegotiation attacks and other factors. The data that the SSL Pulse project has gathered thus far shows that the vast majority of the 200,000 sites the project is surveying need some serious help in fixing their SSL implementations."
This discussion has been archived. No new comments can be posted.

SSL Pulse Project Finds Just 10% of SSL Sites Actually Secure

Comments Filter:
  • by rastoboy29 ( 807168 ) on Friday April 27, 2012 @11:32PM (#39829649) Homepage
    ..giving a false sense of security.

    For example, I've personally discovered hundreds of servers with compromised PHP scripts that worked merrily along via HTTPS, looking very secure.  Unfortunately, attackers can attack a poorly written script over HTTPS exactly as easily as via HTTP, compromise it, and steal information (or whatever) just fine.
  • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Friday April 27, 2012 @11:46PM (#39829691)

    SSL just encrypts the channel.
    SSL does not fix anything else.
    How could it?

    Crap code on a website is still crap code on a website whether you have an encrypted channel or clear text channel.

  • by ivan.ristic ( 631774 ) on Saturday April 28, 2012 @03:21AM (#39830407) Homepage
    It would definitely be nice if the test supported SNI (it will soon), but, in our test, SNI is not very important for public SSL. If you are running a public web site you want people to see it, and, across the global audience, too many people cannot use it, which is why public sites don't use it either. The fact that our test does not support SNI has no effect on SSL Pulse, because it uses the results only from the sites with certificates we could validate.
  • by Lennie ( 16154 ) on Saturday April 28, 2012 @04:58AM (#39830711)

    Which is perfect, it prevents a Network Intrusion Detection System from preventing the attack. ;-)

  • by julesh ( 229690 ) on Saturday April 28, 2012 @11:05AM (#39831815)

    But it does not explain why about 33% of the servers surveyed support SSL v2.0, which virtually no client wants to use, and which is also insecure.

    Because, as a server operator, I don't especially care if clients are spoofed. I don't perform any authentication of their identities anyway, so my security doesn't decrease.

    If the client wants to use an insecure protocol (or is incorrectly configured to use an insecure protocol in preference to a new one), then that is the client's concern. I'm not going to stop them if they don't want to -- they can turn off SSL2 in their browser options (most modern browsers ship this way anyway) if they care that much. A properly configured browser will use SSL3 or TLS in preference to SSL2 anyway if the server supports it, which mine does, so most people will never notice.

    Speaking purely from a commercial standpoint, denying customers access to my services because they are using an out of date or badly configured system makes no sense.

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...