TLS和SSL爆大漏洞了!!

TLS与SSL零日漏洞

原文:http://news.zdnet.co.uk/security/0,1000000189,39860592,00.htm?tag=mncol;txt

A zero-day flaw in the TLS and SSL protocols, which are commonly used to encrypt web pages, has been made public.

Security researchers Marsh Ray and Steve Dispensa unveiled the TLS (Transport Layer Security) flaw on Wednesday, following the disclosure of separate, but similar, security findings. TLS and its predecessor, SSL (Secure Sockets Layer), are typically used by online retailers and banks to provide security for web transactions.

Ray, who along with Dispensa works for two-factor authentication company PhoneFactor, explained in a blog post on Thursday that he had initially discovered the flaw in August, and demonstrated a working exploit to Dispensa at the beginning of September.

The flaw in the TLS authentication process allows an outsider to hijack a legitimate user's browser session and successfully impersonate the user, the researchers said in a technical paper.

The fault lies in an "authentication gap" in TLS, Ray and Dispensa said. During the cryptographic authentication process, in which a series of electronic handshakes take place between the client and server, there is a loss of continuity in the authentication of the server to the client. This gives an attacker an opening to hijack the data stream, they said.

In addition, the flaw allows practical man-in-the-middle attacks against hypertext transfer protocol secure (Https) servers, the researchers said. Https is the secure combination of http and TLS used in most online financial transactions.

The flaw will prove a problem for a long time to come, security researcher Chris Paget wrote in a blog post, as it also affects SSL.

"How about the thousands of different software update mechanisms out there that depend on SSL being secure in order to function?" wrote Paget. "This is a protocol-level breach; one that requires a modification to the way that SSL and TLS function in order to repair."

After they found the flaw, Ray and Dispensa disclosed their findings to the Industry Consortium for the Advancement of Security on the Internet (Icasi), a tech association that consists of Cisco, IBM, Intel, Juniper Networks, Microsoft and Nokia. The researchers also alerted the Internet Engineering Task Force (IETF) and a number of open-source SSL implementation projects.

On 29 September, the various groups involved met and decided to set up a project, called Project Mogul, to handle remediation efforts. It will first concentrate on creating a protocol extension as a preliminary solution. Ray said in his blog that he expected to see announcements from the multi-vendor collaboration "shortly", including an internet draft proposal for the fix.

At the September meeting, Ray and Dispensa were informed about research being done by the IETF TLS Channel Bindings working group, which was following a similar line of inquiry into the TLS protocol.

On Wednesday, Martin Rex, a member of the IETF TLS Channel Bindings working group and researcher at SAP, published a man-in-the-middle TLS renegotiation flaw in Microsoft IIS. The flaw, which is essentially the same as the one discovered by Ray, was publicised on Twitter by security researcher HD Moore.

Ray and Dispensa decided on Wednesday that the flaw was in the public domain, and so decided on full disclosure of their work.

在Nginx中,使用弱密码套件(Weak Cipher Suites)可能导致TLS/SSL漏洞,攻击者可以利用这些漏洞解密通信内容或发起中间人攻击。为了修复这一问题,需要对Nginx的SSL配置进行优化,确保仅启用安全的协议版本加密套件。 ### 协议与加密套件配置 在现代Web服务器中,建议禁用旧版本的TLS协议(如TLS 1.0TLS 1.1),并优先使用TLS 1.2TLS 1.3,因为它们提供了更强的安全性[^3]。对于加密套件的选择,应避免使用不安全的算法组合,例如包含`MD5`、`SHA1`、`RC4`、`DES`或`3DES`的套件。推荐的加密套件配置如下: ```nginx ssl_protocols TLSv1.2 TLSv1.3; ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305'; ssl_prefer_server_ciphers on; ``` 上述配置确保了仅使用前向保密(Forward Secrecy)支持的加密套件,并且启用了高性能的AEAD(Authenticated Encryption with Associated Data)算法,如AES-GCMChaCha20-Poly1305。 ### 禁用TLS压缩 某些旧版本的OpenSSLNginx可能存在TLS压缩相关的安全风险,容易受到CRIME攻击。如果你使用的是OpenSSL 1.0以下版本,必须确保Nginx版本为1.2.2+或1.3.2+,以便能够禁用TLS压缩功能[^2]。在Nginx配置文件中无需额外配置即可禁用TLS压缩,因为它在较新版本中默认关闭。 ### 安全增强配置 除了加密套件协议版本的控制外,还可以通过其他方式增强SSL/TLS的安全性: - **ECDH参数配置**:使用强椭圆曲线,例如X25519,以提高密钥交换的安全性。 ```nginx ssl_ecdh_curve X25519; ``` - **会话管理优化**:合理设置SSL会话缓存超时时间,以提升性能并减少重复握手带来的开销。 ```nginx ssl_session_timeout 1d; ssl_session_cache shared:MozSSL:10m; ssl_session_tickets off; ``` - **OCSP装订(Stapling)**:启用OCSP Stapling可以提高证书吊销检查的效率,并减少客户端直接访问CA服务器的请求。 ```nginx ssl_stapling on; ssl_stapling_verify on; ``` - **HTTP严格传输安全(HSTS)**:通过添加HSTS头,强制浏览器始终使用HTTPS连接,防止降级攻击。 ```nginx add_header Strict-Transport-Security "max-age=63072000" always; ``` ### 漏洞检测与修复总结 在检测修复TLS/SSL Weak Cipher Suites漏洞时,可以通过工具如`openssl`命令行工具、`nmap --script ssl-enum-ciphers`或在线服务(如[SSL Labs](https://www.ssllabs.com/ssltest/))来扫描当前服务器使用的加密套件协议版本。如果发现存在弱加密套件或过时协议(如SSL 3.0、TLS 1.0),应立即更新Nginx配置并重启服务以应用新的安全策略。 此外,还应遵循最小化原则,只启用必要的协议算法,同时结合前瞻性配置防御深度策略,持续监控优化安全设置,以应对不断变化的安全威胁[^3]。 ---
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值