Tag Archive for: protections

Fatally weak MD5 function torpedoes crypto protections in HTTPS and IPSEC

Enlarge (credit: US Navy)

If you thought MD5 was banished from HTTPS encryption, you’d be wrong. It turns out the fatally weak cryptographic hash function, along with its only slightly stronger SHA1 cousin, are still widely used in the transport layer security protocol that underpins HTTPS. Now, researchers have devised a series of attacks that exploit the weaknesses to break or degrade key protections provided not only by HTTPS but also other encryption protocols, including Internet Protocol Security and secure shell.

The attacks have been dubbed SLOTH—short for security losses from obsolete and truncated transcript hashes. The name is also a not-so-subtle rebuke of the collective laziness of the community that maintains crucial security regimens forming a cornerstone of Internet security. And if the criticism seems harsh, consider this: MD5-based signatures weren’t introduced in TLS until version 1.2, which was released in 2008. That was the same year researchers exploited cryptographic weaknesses in MD5 that allowed them to spoof valid HTTPS certificates for any domain they wanted. Although SHA1 is considerably more resistant to so-called cryptographic collision attacks, it too is considered to be at least theoretically broken. (MD5 signatures were subsequently banned in TLS certificates but not other key aspects of the protocol.)

“Notably, we have found a number of unsafe uses of MD5 in various Internet protocols, yielding exploitable chosen-prefix and generic collision attacks,” the researchers wrote in a technical paper scheduled to be discussed Wednesday at the Real World Cryptography Conference 2016 in Stanford, California. “We also found several unsafe uses of SHA1 that will become dangerous when more efficient collision-finding algorithms for SHA1 are discovered.”

Read 7 remaining paragraphs | Comments

Technology Lab – Ars Technica

Former BlueHat Prize winner pwns Microsoft, researcher bypasses all EMET protections

At BSides security conference in San Francisco, Bromium Labs’ security researcher Jared DeMott showed attack code capable of bypassing “all of the protections” in Microsoft’s free Enhanced Mitigation Experience Toolkit (EMET) 4.1.
Ms. Smith’s blog

Shaming America in Europe, US Gov’t argues against citizens’ privacy protections

Due to the new privacy laws that the EU is working on, the ACLU’s Jay Stanley and Ben Wizner are in Europe. “Unlike the United States, Europe has a set of basic rules and institutions in place to protect individuals’ privacy, and is trying to update its existing rules and institutions for the digital age,” the ACLU wrote.
Ms. Smith’s blog

‘Troubling disconnect’ between mobile security threats and protections in place – Healthcare IT News

'Troubling disconnect' between mobile security threats and protections in place
Healthcare IT News
DALLAS – Even as nearly everyone is using smartphones and tablets for critical information, few organizations have taken steps to keep the devices safe from cyber threats, according to a new survey from the Polytechnic Institute of New York University

and more »

“mobile security” – read more