Logjam - vulnerabilities in Diffie-Hellman key exchange affect browsers and servers using TLS
There's a new vulnerability in town... "The new bug, dubbed LogJam, is a cousin of Freak. But it’s in the basic design of TLS itself, meaning all Web browsers, and some email servers, are vulnerable." [1] According to the article, "Internet-security experts crafted a fix for a previously undisclosed bug in security tools used by all modern Web browsers. But deploying the fix could break the Internet for thousands of websites."
Logjam attack can allow an attacker "to significantly weaken the encrypted connection between a user and a Web or email server..." [2]
From: https://weakdh.org/
Diffie-Hellman key exchange is a popular cryptographic algorithm that allows Internet protocols to agree on a shared key and negotiate a secure connection. It is fundamental to many protocols including HTTPS, SSH, IPsec, SMTPS, and protocols that rely on TLS.
We have uncovered several weaknesses in how Diffie-Hellman key exchange has been deployed...
We're starting to see news coverage from other outlets, and we're sure more analysis will emerge. However, at this time your best source for more information on this bug is at weakdh.org.
For now, ensure you have the most recent version of your browser installed, and check for updates frequently. If you’re a system administrator, please review the Guide to Deploying Diffie-Hellman for TLS at https://weakdh.org/sysadmin.html
--
Brad Duncan
ISC Handler and Security Researcher at Rackspace
References:
[1] http://www.wsj.com/articles/new-computer-bug-exposes-broad-security-flaws-1432076565
[2] http://www.pcworld.com/article/2924532/new-encryption-flaw-logjam-puts-web-surfers-at-risk.html
Comments
But the whole "using default configurations for servers and forgetting about them" is definitely not limited to email servers.
Anonymous
May 20th 2015
9 years ago
Any idea how I can check a server Diffie-Hellman key size?
The testing tool at https://weakdh.org/sysadmin.html is for web servers. We want to check our mail and VPN servers.
Anonymous
May 20th 2015
9 years ago
Anonymous
May 20th 2015
9 years ago
Anonymous
May 20th 2015
9 years ago
nmap --script ssl-enum-ciphers -p <port> <ip-address> | grep EXPORT
nmap --script ssl-enum-ciphers -p <port> -iL <filename> | grep EXPORT
Anonymous
May 20th 2015
9 years ago
By now, everyone should have disable EXPORT ciphers due to FREAK.
I am more concerned with non EXPORT DH; how do I detect that it is 1024 or 2048?
For example, Microsoft added DHE_AES-GCM cipher support (https://support.microsoft.com/en-us/kb/2929781/) last year.
We decided not to enable it as they were 1024-bit DH. Seems that Windows SCHANNEL and even Java do not handle DH more than 1024 bit.
EDIT : found the answer at https://openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/
To check YOURMAILSERVER IMAPS port at 993.
openssl s_client -connect YOURMAILSERVER:993 -cipher "EDH" | grep "Server Temp Key"
To check SMTP STARTTLS
openssl s_client -starttls smtp -connect YOURMAILSERVER:25 -cipher "EDH" | grep "Server Temp Key"
"Server Temp Key: DH, 2048 bits"
Anonymous
May 21st 2015
9 years ago
Take note Apache instructions on https://weakdh.org/sysadmin.html only works on httpd 2.4.8 and later, and OpenSSL 1.0.2 or later.
The best option is to disable DH and use ECDHE.
Anonymous
May 21st 2015
9 years ago
https://bitbucket.org/snippets/wneessen/grb8
Replaces 512 and 1024 bit DHE with 2048 and 3072.
Anonymous
May 21st 2015
9 years ago
Anonymous
May 21st 2015
9 years ago
Just realized that SSH is also affected. Currently no instructions at https://weakdh.org/sysadmin.html
Seems that we need to modify KexAlgorithms and generate new moduli.
Wonderful number : CVE-2015-4000
EDIT : contacted WeakDH team and they have added SSH instructions.
Anonymous
May 21st 2015
9 years ago