日本SSL/TLS现状调查-针对重新协商漏洞和短RSA密钥长度问题的过渡

Yuji Suga
{"title":"日本SSL/TLS现状调查-针对重新协商漏洞和短RSA密钥长度问题的过渡","authors":"Yuji Suga","doi":"10.1109/AsiaJCIS.2012.10","DOIUrl":null,"url":null,"abstract":"In 2009, researchers released details of a vulnerability in the SSL and TLS protocols that could allow Man-in-the-Middle attacks to be carried out. SSL and TLS operate between the IP and application layers and ensure application data encryption and data integrity, authenticating the target of communications using X.509 public key certificates. As they are used together with application layer communication protocols such as HTTP, SMTP, and POP, it seems that this vulnerability affects a large number of applications and systems. This vulnerability can be attributed to a problem in the SSL and TLS protocol specifications themselves. Fixes have been released for Open SSL and Apache immediately, however most of these involve simply disabling the renegotiation feature that is causing the problem. More thorough measures would require an update to the current specifications and migration to implementations that follow the new specifications. IETF published countermeasures with unprecedented speed as RFC5746, however server-side implementations are not deployed because of problems in business such as the loss of opportunities and backward compatibilities. This paper discusses about problems of a transitioning to new specifications including the SSL/TLS renegotiation vulnerability and short key lengths of RSA algorithm using in SSL/TLS, and also reports the latest status of these weakness on web sites of local governments and universities in Japan. Note that 40.7% local government are vulnerable against the DOS attack using the SSL/TLS renegotiation vulnerability and 36.9% sites use 1024 bit or less RSA keys.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"50 5","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"SSL/TLS Status Survey in Japan - Transitioning against the Renegotiation Vulnerability and Short RSA Key Length Problem\",\"authors\":\"Yuji Suga\",\"doi\":\"10.1109/AsiaJCIS.2012.10\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In 2009, researchers released details of a vulnerability in the SSL and TLS protocols that could allow Man-in-the-Middle attacks to be carried out. SSL and TLS operate between the IP and application layers and ensure application data encryption and data integrity, authenticating the target of communications using X.509 public key certificates. As they are used together with application layer communication protocols such as HTTP, SMTP, and POP, it seems that this vulnerability affects a large number of applications and systems. This vulnerability can be attributed to a problem in the SSL and TLS protocol specifications themselves. Fixes have been released for Open SSL and Apache immediately, however most of these involve simply disabling the renegotiation feature that is causing the problem. More thorough measures would require an update to the current specifications and migration to implementations that follow the new specifications. IETF published countermeasures with unprecedented speed as RFC5746, however server-side implementations are not deployed because of problems in business such as the loss of opportunities and backward compatibilities. This paper discusses about problems of a transitioning to new specifications including the SSL/TLS renegotiation vulnerability and short key lengths of RSA algorithm using in SSL/TLS, and also reports the latest status of these weakness on web sites of local governments and universities in Japan. Note that 40.7% local government are vulnerable against the DOS attack using the SSL/TLS renegotiation vulnerability and 36.9% sites use 1024 bit or less RSA keys.\",\"PeriodicalId\":130870,\"journal\":{\"name\":\"2012 Seventh Asia Joint Conference on Information Security\",\"volume\":\"50 5\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-08-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Seventh Asia Joint Conference on Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsiaJCIS.2012.10\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Seventh Asia Joint Conference on Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS.2012.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

2009年,研究人员公布了SSL和TLS协议中一个漏洞的细节,该漏洞可能会导致中间人攻击的实施。SSL和TLS在IP层和应用层之间运行,确保应用程序数据加密和数据完整性,使用X.509公钥证书对通信目标进行身份验证。由于它们与应用层通信协议(如HTTP、SMTP和POP)一起使用,因此该漏洞似乎影响了大量的应用程序和系统。此漏洞可归因于SSL和TLS协议规范本身的问题。Open SSL和Apache的修复程序已经立即发布,但是大多数修复程序只涉及禁用导致问题的重新协商功能。更彻底的措施将需要更新当前规范,并迁移到遵循新规范的实现。IETF以前所未有的速度发布了对策RFC5746,但是由于业务上的问题,例如失去机会和向后兼容性,没有部署服务器端实现。本文讨论了SSL/TLS重新协商漏洞和SSL/TLS中RSA算法的短密钥长度等过渡到新规范的问题,并报告了这些漏洞在日本地方政府和大学网站上的最新情况。请注意,40.7%的地方政府容易受到使用SSL/TLS重新协商漏洞的DOS攻击,36.9%的网站使用1024位或更少的RSA密钥。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
SSL/TLS Status Survey in Japan - Transitioning against the Renegotiation Vulnerability and Short RSA Key Length Problem
In 2009, researchers released details of a vulnerability in the SSL and TLS protocols that could allow Man-in-the-Middle attacks to be carried out. SSL and TLS operate between the IP and application layers and ensure application data encryption and data integrity, authenticating the target of communications using X.509 public key certificates. As they are used together with application layer communication protocols such as HTTP, SMTP, and POP, it seems that this vulnerability affects a large number of applications and systems. This vulnerability can be attributed to a problem in the SSL and TLS protocol specifications themselves. Fixes have been released for Open SSL and Apache immediately, however most of these involve simply disabling the renegotiation feature that is causing the problem. More thorough measures would require an update to the current specifications and migration to implementations that follow the new specifications. IETF published countermeasures with unprecedented speed as RFC5746, however server-side implementations are not deployed because of problems in business such as the loss of opportunities and backward compatibilities. This paper discusses about problems of a transitioning to new specifications including the SSL/TLS renegotiation vulnerability and short key lengths of RSA algorithm using in SSL/TLS, and also reports the latest status of these weakness on web sites of local governments and universities in Japan. Note that 40.7% local government are vulnerable against the DOS attack using the SSL/TLS renegotiation vulnerability and 36.9% sites use 1024 bit or less RSA keys.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信