-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
weak cryptographic method #9
Comments
I think that this is because the CBC cipher suites, e.g. RSA_WITH_AES_128_CBC_SHA; they are vulnerable to the BEAST attack. See comment with link in GetServerProperties.pm, line 275ff Because BEAST is not a major issue since most clients nowadays are protected against BEAST, this might be changed from weak to medium. But depending on the client it might be still an issue. You can use I recommend to use the config from Bettercrypto with their default list B for typical servers. The CBC cipher suites are not enabled there, but other so you get compatibility with old browsers (e.g. Android). |
Please look at Bettercrypto Config A (strong ciphers, fewer clients), list of ciphers: DHE-RSA-AES256-GCM-SHA384 TLSv1.2 DH RSA AESGCM(256) AEAD 2 out of 4 ciphers are CBC ciphers. Config B (better compatibility) will result in ciphers, which are known to be vulnerable to the BEAST attack. This is (and was) the config I'm using on my server. DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD So I can choose between a good result in your test (and the IHK study) and no visitors or a config that is working with "common" browsers. |
Please look at https://www.ssllabs.com/ssltest/analyze.html?d=bettercrypto.org. Even the config of bettercrypto.org uses TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, which is a weak cipher according to the comment in GetServerProperties.pm . |
Output of bin/check_ciphers_single_domains.pl bettercrypto.org: ECDHE_RSA_WITH_AES_128_CBC_SHA is not listed under "Supported cipher suites", but 'used' by Win 7 (IE 8). If that cipher can be choosen, it should be listed under "Supported cipher suites", as in the test at ssllabs.com . But then result would be, that those host supports weak ciphers. |
That is really strange and looks like the ECDHE-suites are not recognized in the list, but when checking the browser compatibility. |
Now I have analyzed this issues. CBC Cipher suites Weak?The first one is the question how to handle CBC cipher suites. As mentioned, CBC-Cipher-Suites are affected by the BEAST vulnerability – but not all. Only CBC-SHA, not CBC-SHA-256 or CBC-SHA-384. TLS-Check took this ratings from O-Saft, they are listed in Net::SSL::CipherSuites (you have to scroll right, because long lines!) As mentioned above and in GetServerProperties.pm, this should be revised. All Scorings should be revised. The problem with scoring is, that different scores may be right – depending on the point of view. Therefore the idea is to have pluggable scorings, so that they can be changed by the user. The focus of TLS-Check was, that we get summaries, but for individual this become more important. |
Not listed Cipher SuitesThe problem with the not listed cipher suite ECDHE_RSA_WITH_AES_128_CBC_SHA is, that some servers seem to ignore some given cipher suites, when there are a lot of cipher suites given. For this, Net::SSL::CipherSuites can split a list of cipher suites into parts (see sub split_into_parts). By default this code is used and splits them into parts of 146 bytes. This is still too much for some servers: for bettercrypto.org, the result is OK with 86 or fewer bytes, not OK for 88 bytes and up. Most servers can handle 300 bytes without any problem. Until now I'm not sure if this is a bug of the server or a bug of TLS-Check, but TLS-Check should (must!) handle it correctly! So, this is the resreason, why the cipher suite is not listed in the full list, but when checking the browser lists. |
My problem is, that there may be companies asking their provider (i.e. me) about this IHK study. And I have to tell them, that the server is configured like recommended (Bettercrypto B), but this configuration contains "weak" ciphers (that are not choosen by modern browsers). BEAST should be mitigated by most modern browsers by now. |
We don't release informations about a single server or IHK member, this is one reason. For the score, it doesn't matter much, if the BEAST-vulnerable CBC suites are counted as weak or not. The main goal for TLS-Check is to provide an summary/overview, not individual results. But beside the IHK project I plan to extend the individual tests. In this context the scorings of each cipher suites should be revised. When you use only recommended cipher suites, this is OK; at the moment TLS-check counts BEAST vulnerable cipher suites as „weak“, we discussed in the past if we change this and my opinion is, that we should change this – so we have to discuss it again. The real world problem is, that there are some old browsers, which only support old protocols and old cipher suites. For this, everyone has to support the old stuff. In all presentations I referred to this. |
Some more classification for weak/medium cipher suites, addresses issue #9.
Result of the test for madavi.de (HTTP)
"… bieten schwache kryptografische Verfahren an (z.B. RC4, 56 Bit, ...)";"1 (100%)";"1 (100%)"
but I can't find a weak cipher in the following lists:
There are 3DES ciphers in the list for PCI compliance. Are these treated as week (string contains DES)?
The test on ssllab.com gives an "A+".
The text was updated successfully, but these errors were encountered: