POODLE Flaw Returns, This Time Hitting TLS Protocol 54
angry tapir writes: If you patched your sites against a serious SSL flaw discovered in October you will have to check them again. Researchers have discovered that the POODLE vulnerability also affects implementations of the newer TLS protocol. The POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability allows attackers who manage to intercept traffic between a user's browser and an HTTPS website to decrypt sensitive information, like the user's authentication cookies.
Re:After the jump BULLSHIT (Score:4, Funny)
Don't you mean Dog shit instead of bullshit? After all, this is a POODLE vulnerability.
Re: (Score:1)
Re: (Score:2, Interesting)
At the current time, the post in question started at 2 and has +1 Funny for a total of 3.
If you are logged in, you can also change the weight of users to remove the karma bonus.
Re: (Score:2)
GP asked for this:
Can't anybody just post the damn direct link to the fucking advisory or source articles anymore.
Disabling Javascript isn't going to help with that.
Re: (Score:2)
Test your site with this (Score:5, Informative)
Re:Test your site with this (Score:4, Insightful)
Turns out when I was using their guides and aiming for an A+ rating in October (not long after I took over the current post) I accidentally mitigated TLS POODLE before it even became publicly known. So.. whoops? Better not follow the best practices guides next time, better just patch the vulnerabilities as they come
Re: (Score:2)
If you're using IIS 7.5/8 there's this script [www.hass.de] for securing* it. Though it may lock out XP users (which probably isn't a bad thing) due to disabling RC4.
* You there in the back, stop laughing.
Re: (Score:3)
Thankfully, this looks to be an implementation issue and not a protocol issue like SSL had. From the blog of the folks who run that SSL test [qualys.com]:
Re: A question I hope someone can answer (Score:5, Insightful)
Have you considered upgrading your browser!
Re: (Score:2)
For those of us who are stuck using older browsers (FireFox v10 or IE6), even with SSL disabled and only TLS 1.0 enabled, will this be a problem?
As I said, stuck. I won't appreciate replies saying to upgrade my browser.
Yes, in fact it is ONLY you who are affected. This was discovered in old versions of NSS, which means old Firefox and Chromium versions.
Re: (Score:1)
You should consider NCSA Mosaic [wikipedia.org]. I can guarantee that it is not vulnerable to any flaws SSL or TLS [wikipedia.org].
Re: (Score:2)
I don't know his exact situation, but it's possible that the company he works at has an app that only works with IE6. There used to be many apps like this.
If this is such a case, the fuckwad is the company (for not hiring developers to upgrade the app) or the vendor that supplies the app without upgrading it (Maybe the company is still to blame for not moving to a more current product, or maybe there isn't one). Either way, the user that is forced to stick with the crappy browser is not necessarily the prob
Re: (Score:3)
don't know his exact situation, but it's possible that the company he works at has an app that only works with IE6. There used to be many apps like this.
That's no excuse! IE6 belongs in a VM used only for internal sites and strictly firewalled off from the outside world. But even if you're stuck with IE6, at least run the latest FF or something beside it.
Re: (Score:2)
Unless your company/vendor forces you to use it externally, or will not provide said VM for internal sites.
I'm not agreeing that it's OK to use such a browser, just saying that it's not necessarily the users own fault. Companies can be idiots too when it comes to IT security.
Re: (Score:2)
For those of us who are stuck using older browsers (FireFox v10 or IE6), even with SSL disabled and only TLS 1.0 enabled, will this be a problem?
As I said, stuck. I won't appreciate replies saying to upgrade my browser.
In IE 6.0, you can enable TLS 1.0. It is not on by default.
It is deep in the "Internet Settings" in "Security". Scroll down the list and find where it mentions TLS.
IE 6.0 does not do TLS 1.1 or later, so when TLS 1.0 gets shut off, you are done with it.
I believe RC4 is only in SSL 3.0 so that being on or off doesn't matter.
PS, most sites already have 3.0 off, so you may be in the clear already.
This is the God of Job (Score:2, Funny)
If there were a just and caring God, he would never let geeks name things.
POODLE?
Jesus wept. Literally. He heard the name and wept tears.
Geeks made baby Jesus cry.
Re: (Score:2)
Re: (Score:2)
And if you don't think that's a backronym, I have some swampland in Florida to sell you.
Re: (Score:2)
The CVE for this has already been rejected. There was an implementation problem on a specific piece of network equipment and not a general TLS implementation issue
Link?
Re: (Score:2)
https://www.imperialviolet.org... [imperialviolet.org]
This affects BigIP F5 and A10 load balancers which implement TLS incorrectly.
Re: (Score:2)
This affects BigIP F5 and A10 load balancers which implement TLS incorrectly.
Proper grouping: ((BigIP F5) and (A10)) (load balancers).
SSL, Poodle and mail (Score:2)
Anyone who doesn't irrationally hate Apple have any tips, suggestions for fixing this? I'm still using OS X 10.7 so maybe my best bet is to upgrade the OS, but would like to avoid doing so to keep some older programs r
Re: (Score:2)
I'm still using OS X 10.7 so maybe my best bet is to upgrade the OS, but would like to avoid doing so to keep some older programs running.
Out of curiosity, what programs do you use that break post-10.7?
The only program I've run into that works on 10.7 but not anything after is QuarkXPress 8 (and earlier) using a License Server (the license server networking code uses a deprecated system library).
Other than that, Yosemite has been grand.
Re: (Score:2)
implementation flaw not protocol flaw (Score:2, Informative)
It is very important to understand that this is a flaw in some vendors' TLS implementation, NOT in the tls protocol itself.
Re: (Score:2)
It is very important to understand that this is a flaw in some vendors' TLS implementation, NOT in the tls protocol itself.
The protocol invites this sort of implementation error. Hence proposals like this: http://clearcrypt.org/tls/ [clearcrypt.org]