From: Mike Belshe <[email protected]> Date: Thu, 13 Sep 2012 20:20:49 -0700 To: httpbis mailing list <ietf[email protected]> Message-ID: <CABaLYCsAmOe7z68E25pfYsuhb8r_AsH-AbzX-VfUYK_VGWbGDg@mail.gmail.com> You may have read about the CRIME attack recently: http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor/19914#19914 http://www.cio.com/article/716161/_39_CRIME_39_
SSLã®( ´Ïï½) 証ææ¸ã¨CipherSuiteã¨ä»è¨å®ãæ¡ç¹ãã¦ããããµã¤ããããã¾ãã Qualys â¦
It seems that it is that time of year again, when Juliano and Thai present their most recent attack against crypto system. Last year, it was BEAST. This year, itâs CRIME, a practical attack against how TLS is used in browsers. In a wider sense, the same attack conceptually applies to any encrypted protocol where the attacker controls what is being communicated. Initially, it was only known that th
Post author:Paolo Passeri Post published:September 13, 2012 Post category:Security Post comments:2 Comments Reading time:2 mins read Last Updated on May 24, 2015 More details have been released about CRIME, the brand new attack against TLS developed by Juliano Rizzo and Thai Duong. The attack takes advantage of a flaw in the compression ratio of TLS requests wich allows the attacker to decrypt the
Two security researchers claim to have developed a new attack that can decrypt session cookies from HTTPS (Hypertext Transfer Protocol Secure) connections. From the security researchers who created and demonstrated the BEAST (Browser Exploit Against SSL/TLS) tool for breaking SSL/TLS encryption comes another attack that exploits a flaw in a feature in all versions of TLS. The new attack has been g
'CRIME' Attack Abuses SSL/TLS Data Compression Feature to Hijack HTTPS Sessions SSL/TLS data compression leaks information that can be used to decrypt HTTPS session cookies, researchers say The 'CRIME' attack announced last week exploits the data compression scheme used by the TLS (Transport Layer Security) and SPDY protocols to decrypt user authentication cookies from HTTPS (HTTP Secure) traffic,
ã¯ãã㫠以åã®ã¨ã³ããªã§SSLã«å¯¾ããæ°ããæ»æææ³ãBEASTããç´¹ä»ãã¾ããããä»åã¯BEASTãããã«çºå±ããããCRIMEãã¨ããæ»æã«ã¤ãã¦ç°¡åã«ç´¹ä»ãããã¨æãã¾ããä¸æ¬¡æ å ±æºã¨ãã¦ãã¡ãã®ã¹ã©ã¤ãï¼è±èªï¼ãé²è¦§ã§ãã¾ãã®ã§ãæéãããæ¹ã¯ãã²ç®ãéãã¦ã¿ã¦ãã ããã CRIMEã®æå³ CRIME㯠"Compression Ratio Info-Leak Made Easy" ããã㯠"Compression Ratio Info-Leak Mass Exploitation" ã®é æåã§ãSSLãSPDYï¼ãããã¯HTTPããã£é¨ã®gzipå§ç¸®ï¼ã§ä½¿ãããå§ç¸®ã¢ã«ã´ãªãºã ã«æ³¨ç®ããæ»æææ³ã§ãããã¾ãç¥ããã¦ãã¾ãããSSLã«ã¯å§ç¸®æ©è½ãåå¨ãã¦ããããµã¼ãå´ã»ã¯ã©ã¤ã¢ã³ãå´åæ¹ãå§ç¸®æ©è½ãONã«ãã¦ããå ´åã«ããã¼ã¿ãå§ç¸®ããã¾ãã BEASTã¨ã®é¢ä¿ CRIMEã¯B
æ°æ»æãã¼ã«ã®ãCRIMEãã¯ãå§ç¸®ãããã³ã«ãSPDYãã®å®è£ ã«é¢ããèå¼±æ§ãçªããSSLã§æå·åãããHTTPSã»ãã·ã§ã³ãä¹ã£åããã¨ãã§ãã¦ãã¾ãã¨ããã ã¢ã«ã¼ã³ãã³ã§9æ19æ¥ããéãããã»ãã¥ãªãã£ã«ã³ãã¡ã¬ã³ã¹ãekopartyãã§ã2人ã®ã»ãã¥ãªãã£ç 究è ãTLSï¼SSLãæ»æããæ°ãã¼ã«ãCRIMEãã®çºè¡¨ãäºå®ãã¦ãããç±³ã»ãã¥ãªãã£æ©é¢ã®SANS Internet Storm Centerãããã°ã§ä¼ããã SANSã®13æ¥ã®ããã°ã«ããã¨ãåãã¼ã«ã¯å§ç¸®ãããã³ã«ãSPDYãã®å®è£ ã«é¢ããèå¼±æ§ãçªããSSLã§æå·åãããHTTPSã»ãã·ã§ã³ãä¹ã£åããã¨ãã§ãã¦ãã¾ãããã®æ»æã¯ãWebãµã¤ãã¨Webãã©ã¦ã¶ã®ä¸¡æ¹ãSPDYããµãã¼ããã¦ããå ´åã«ã®ã¿éç¨ããããã ã¨ãã¦ããã SPDYããµãã¼ããã¦ããã®ã¯ã主è¦ãã©ã¦ã¶ã§ã¯Mozillaã®Firefoxã¨Go
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}