Top Banner
36

Can SSL and TOR be intercepted? Secure Socket Layer.

Jan 18, 2016

Download

Documents

Cornelius Ward
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Can SSL and TOR be intercepted? Secure Socket Layer.
Page 2: Can SSL and TOR be intercepted? Secure Socket Layer.

Can SSL and TOR be intercepted?

Page 3: Can SSL and TOR be intercepted? Secure Socket Layer.

Secure Socket Layer

Page 4: Can SSL and TOR be intercepted? Secure Socket Layer.

De-facto standard to encrypt

communications

Can ensure the identity of the peer

Page 5: Can SSL and TOR be intercepted? Secure Socket Layer.

Prerequisite to decrypt a communication:

You have to monitor it!

Page 6: Can SSL and TOR be intercepted? Secure Socket Layer.

Most of the SSL attacks are MITM-based

Page 7: Can SSL and TOR be intercepted? Secure Socket Layer.

Physically in the middle

Rogue AP, ISP, etc.

Page 8: Can SSL and TOR be intercepted? Secure Socket Layer.

Logically in the middle

Take a look at our 2003 BlackHat presentation…

Page 9: Can SSL and TOR be intercepted? Secure Socket Layer.

Ok but…can SSL be intercepted?

Page 10: Can SSL and TOR be intercepted? Secure Socket Layer.

Three attacks’ categories

Page 11: Can SSL and TOR be intercepted? Secure Socket Layer.

Protocol design and math

Chain of trust

The User

Page 12: Can SSL and TOR be intercepted? Secure Socket Layer.

Let’s start with…

Page 13: Can SSL and TOR be intercepted? Secure Socket Layer.

Protocol design and math

Page 14: Can SSL and TOR be intercepted? Secure Socket Layer.

Weak encryption can be easily cracked

Protocol and algorithms are negotiated during the handshake

This “attack” can be performed passively

Page 15: Can SSL and TOR be intercepted? Secure Socket Layer.

Weak encryption can be easily cracked

~70%* of the Internet uses only “strong” encryption

What’s “weak” and what’s “easy”? Ask the NSA…

* Trustworthy Internet Movement 2014/10/3 on 151.509 web sites

Page 16: Can SSL and TOR be intercepted? Secure Socket Layer.

SSLv2 Downgrade Attack

No integrity check on the handshake

Weaker encryption algorithms can be forced

Page 17: Can SSL and TOR be intercepted? Secure Socket Layer.

SSLv2 Downgrade Attack

SSLv2 disabled by default on most systems

Page 18: Can SSL and TOR be intercepted? Secure Socket Layer.

SSLv3 is vulnerable as well…

POODLE attack (September 2014)

could be used to decrypt HTTPS cookies

Page 19: Can SSL and TOR be intercepted? Secure Socket Layer.

SSLv3 is vulnerable as well…

Most browsers dismissed SSLv3

Providers are going to dismiss it as well

Page 20: Can SSL and TOR be intercepted? Secure Socket Layer.

Protocol version Website Support

SSL 2.0 19.4%

SSL 3.0 98.0%

TLS 1.0 99.3%

TLS 1.1 42.0%

TLS 1.2 44.3%

Website coverage

Page 21: Can SSL and TOR be intercepted? Secure Socket Layer.

TLS Logjam attack

Published on May 2015

Forces TLS connection with weak key

Page 22: Can SSL and TOR be intercepted? Secure Socket Layer.

TLS Logjam attack

Vendors are patching

Page 23: Can SSL and TOR be intercepted? Secure Socket Layer.

Implementation-specific attacks

OpenSSL "Heartbleed" (CVE-2014-0160)

Oracle Java JSSE (CVE-2014-6593)

OpenSSL "Freak" (CVE-2015-0204)

And many others...

Page 24: Can SSL and TOR be intercepted? Secure Socket Layer.

Implementation-specific attacks

Keep your system up to date!

Google’s Nogotofail tests connections for known bugs and weak configurations

Page 25: Can SSL and TOR be intercepted? Secure Socket Layer.

Chain of Trust

Page 26: Can SSL and TOR be intercepted? Secure Socket Layer.

If you have the private key you can see the traffic!

Very hard to detect

This “attack” can be performed passively if no PFS is used

Page 27: Can SSL and TOR be intercepted? Secure Socket Layer.

If you have the private key you can see the traffic!

Don’t give your private key to anyone ;)

Forward Secrecy available on almost 40% of the websites

Page 28: Can SSL and TOR be intercepted? Secure Socket Layer.

Custom CA on the client device

Often used by AVs to inspect traffic

Sometimes used by vendors to insert Ads

Page 29: Can SSL and TOR be intercepted? Secure Socket Layer.

Custom CA on the client device

Don’t install untrusted CA certificates

Keep your OS/AV up to date

Page 30: Can SSL and TOR be intercepted? Secure Socket Layer.

Rogue CA

A malicious CA can sign fake certificates

CAs’ certificates were stolen in the past (eg: Diginotar 2011)

Allows any “active” probe to impersonate any website

Page 31: Can SSL and TOR be intercepted? Secure Socket Layer.

Rogue CA

Public Key Pinning

EFF SSL Observatory monitors trusted CAs

Google and Facebook actively search for rogue CAs

Page 32: Can SSL and TOR be intercepted? Secure Socket Layer.

Rogue CA

In December 2013 0.2% of all connections to Facebook were established with forged certificates

In 2014 Google found evidence from France and India of certificates signed by rogue Cas

In 2015 Google removed all China NIC and EV CAs from their products

Page 33: Can SSL and TOR be intercepted? Secure Socket Layer.

Future alternatives to the Chain of Trust

Trust Assertion for Certificate Keys

DNS-based Authentication of Named Entities

Page 34: Can SSL and TOR be intercepted? Secure Socket Layer.

The User

Page 35: Can SSL and TOR be intercepted? Secure Socket Layer.

SSL Strip attack

Intercept the “redirect to HTTPS” reply

HTTP-to-HTTPS Proxy for the whole communication

Replace HTTPS with HTTP in any link

Page 36: Can SSL and TOR be intercepted? Secure Socket Layer.

SSL Strip attack

Pay attention to the “lock”

Servers using HSTS can force HTTPS on the clients

HTTPS Everywhere plugin doesn’t allow HTTP connections

Mozilla pushes for full HTTPS