Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security IT

Researchers Devise New Attack Techniques Against SSL 33

alphadogg writes "The developers of many SSL libraries are releasing patches for a vulnerability that could potentially be exploited to recover plaintext information, such as browser authentication cookies, from encrypted communications.The patching effort follows the discovery of new ways to attack SSL, TLS and DTLS implementations that use cipher-block-chaining (CBC) mode encryption. The new attack methods were developed by researchers at the University of London's Royal Holloway College. The men published a research paper and a website on Monday with detailed information about their new attacks, which they have dubbed the Lucky Thirteen. They've worked with several TLS library vendors, as well as the TLS Working Group of the IETF, to fix the issue."
This discussion has been archived. No new comments can be posted.

Researchers Devise New Attack Techniques Against SSL

Comments Filter:
  • by Anonymous Coward on Wednesday February 06, 2013 @10:27PM (#42816549)

    No.

    Paranoid though I am, this is a timing attack needing multiple packets. Not something you can do 'offline'

  • New Timing Attack (Score:5, Informative)

    by cryptizard ( 2629853 ) on Wednesday February 06, 2013 @11:24PM (#42816883)
    For lazy people a quick overview of this attack is that it uses very small differences between the amount of time it takes to decrypt a correctly padded TLS record and the time it takes to reject an incorrectly padded record (think of the padding as kind of a checksum). An attacker can modify encrypted records, send them to the server and discover whether the decryption is correctly padded or not based on the amount of time it takes to respond. With this knowledge, an attacker can interactively decrypt a record bit by bit, testing the padding over and over.

    It only works in datagram TLS (DTLS) because regular TLS terminates a session after one incorrectly padded message. It also only works over LAN where you can get really precise timing.

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...