DROWN (CVE-2016-0800)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Mar 2, 2016 at 3:38 PM, Salz, Rich <rsalz at akamai.com> wrote:
>> am [I] still vulnerable to this if my customer's server is not up to date?
>
> Yes, maybe.
>
> If you use SSL3/TLS without PFS ciphers, then someone who has captured the traffic can send SSLv2 messages to the server and decrypt your traffic.

Its probably worth mentioning since "interception is a valid use case"
has permeated both the W3C (browsers) and the IETF (Internet at
large)... Interception and proxy middleware could be contributing
significant risk. Its not readily apparent since the client is
believed to be well configured and the end server appears to be well
configured. Also see "Transitive Trust: SSL/TLS Interception Proxies",
https://www.secureworks.com/research/transitive-trust.

Jeff


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux