Skip to main content

POODLE Attack - Time to die for SSL 3.0

Exploiting SSL 3.0 - The POODLE Attack

On 14th Oct,2014 google has published a serious vulnerability in blueprint of SSL 3.0,naming POODLE – short for Padding Oracle On Downgraded Legacy Encryption. This flaw is not a software bug. This vulnerability allows attackers to decrypt the encrypted sessions between website server and client.

As per Alexa 542,902 sites are SSL 3.0 supported which is 96.9% of HTTPS Alexa.

Exploiting this vulnerability can result in compromise of cookies leading account hijacks. As informed the attack is easy to perform but attacker should be able to capture the traffic. It affects all browsers supporting SSL 3.0 Google Chrome, Mozila Firefox and IE etc.

 The attacker can cause connection failure and forcing the browser to use SSL 3.0 or CBC-mode ciphers with SSL 3.0 and exploiting the vulnerability. So to mitigate this vulnerability is simply disable SSL 3.0 but you may face some compatibility issue. Google has recommended use of TLS_FALLBACK_SCSV
 the Transport Layer Security Signalling Cipher Suite Value that blocks protocol downgrades. This prevent the future downgrade attacks.

To work with legacy servers, many TLS clients implement a downgrade dance: in a first handshake attempt, offer the highest protocol version supported by the client; if this handshake fails, retry (possibly repeatedly) with earlier protocol versions. Unlike proper protocol version negotiation (if the client offers TLS 1.2, the server may respond with, say, TLS 1.0), this downgrade can also be triggered by network glitches, or by active attackers. So if an attacker that controls the network between the client and the server interferes with any attempted handshake offering TLS 1.0 or later, such clients will readily confine themselves to SSL 3.0.

A Detailed guide to POODLE attack can be found here

Countermeasures / Remediation:

Server-Side Countermeasures

Disabling SSL 3.0 in nginx

Disabling the SSL 3.0 in nginx can be done by giving instructions to use only TLS.
change the ssl_protocols Directive or if ssl_protocol directive is not present then mention it on top of configuration file.
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
 

Disabling SSL 3.0 in Apache

For httpd version 2.2.23 and newer change SSL configuration file.add TLSv1, TLSv1.1, and TLSv1.2.
SSLProtocol +TLSv1 +TLSv1.1 +TLSv1.2 
 
For httpd version 2.2.22 and older, only specify TLSv1, It will treat it as a wildcard for all TLS versions.
SSLProtocol TLSv1

Client-Side Countermeasures

Firefox

Please refer here for more info.

Google Chrome

1) Create a Chrome shortcut on desktop and right click.
2) Click on properties
3 )Click on shortcut tab



4)Edit the 'Target' textbox and add double quotes in last (")
5) type --ssl-version-min=tls1

6) Click "OK"

7) You will be asked for Admin permissions, click "Continue"

NOTE: Above steps will work only when you use chrome from desktop shortcut

Internet Explorer

To disable SSLv3 in IE, uncheck the "Use SSL 3.0" box on the "Advanced" tab in the Internet Options program

1) Launch "Internet Options" from the Start Menu
2) Click the "Advanced" tab
3) Uncheck "Use SSL 3.0"




4) Click "OK"

Comments

Post a Comment

Popular posts from this blog

Drozer Commands - A Security & Attack Framework for Android

What is Drozer? Drozer is a Security & Attack Framework for Android Application Testing. Drozer is a tool that can be used for Mobile device review , Secure development of applications, BYOD approval and Mobile application testing. There are 2 Versions of Drozer an Open Source and other one Pro version having following features Gathering the information about the application Find the attack surface Test your Exposure to Public Exploits Execute dynamic code on a device, to avoid the need to compile and install small test scripts. Start Android emulators, provisioned with the drozer Agent and the app you want to investigate. Simulate sensor input, such as GPS, to emulators to test the full attack surface. View the attack surface as a graph. this will be helpful for the risk assessment reporting. Drozer is having agent & server architecture so to start with assessment we have to install the agent in the emulator or connected device. Command to install the Dr

Android Damn Vulnerable App by Security Compass

Tutorial of Android Damn Vulnerable App by Security Compass Introduction: Hi folks, today I am gonna show you some hands on or tutorial of the android app testing which I done during my R&D of android app security testing. Here I will show you from scratch setting up of Lab Server to testing of application. In this you will learn on below topics: 1)Insecure Connection (Traffic over HTTP) 2)Server Side Authorization Issue 3)Insecure File Storage 4)Insecure Logging 5)Encryption of data on device 6)Memory Protection Setting-up of lab (App & Server) First of all you have to download the base app which is damn vulnerable from here . After downloading zip and extracting it you have to build it in .apk format using Eclipse IDE. Now you have to install the app in the emulator before that you have to make sure that you installed SDK and its packages. To install the app you have to start emulator using AVD and clicking on "Start" or by command line emul

OWASP IoT (Internet of Things) Top 10 - A Walkthrough

OWASP IoT (Internet of Things) Top 10 - 2014 Introductions: In Todays world things of everyday are becoming smart, every hour hundreds and thousands of smart devices are being added to the Internet whether it is a Toaster, Camera, Refrigerator, T.Vs, Cars etc. So it can be a target of attackers easily, here comes OWASP IoT Top 10 to address this issue. OWASP IoT Top 10 is designed to make the everyday devices secure on same lines of guidelines by OWASP TOP 10 for applications. The OWASP Internet of Things Top 10 - 2014 is as follows: I1 – Insecure Web Interface I2 – Insufficient Authentication/Authorization I3 – Insecure Network Services I4 – Lack of Transport Encryption I5 – Privacy Concerns I6 – Insecure Cloud Interface I7 – Insecure Mobile Interface I8 – Insufficient Security Configurability I9 – Insecure Software/Firmware I10 – Poor Physical Security  How to test for OWASP IoT Top 10   I1 – Insecure Web Interface: Everyday devices have web ser