Reply to post: Warning: Malware, rogue users can spy on some apps' HTTPS crypto

Warning: Malware, rogue users can spy on some apps' HTTPS crypto – by whipping them with a CAT o' nine TLS

FooCrypt

Warning: Malware, rogue users can spy on some apps' HTTPS crypto

Its been a long day watching the children in parliament and I haven't read the paper in question, but

'The boffins tested OpenSSL, Amazon s2n, MbedTLS, Apple CoreTLS, Mozilla NSS, WolfSSL, GnuTLS, BearSSL and BoringSSL. And they were able to downgrade all except for the last two, BearSSL and BoringSSL.'

From a web server / app api / portal etc perspective, refusing to downgrade would protect the end user trying to connect.

https://cipherli.st

Apache2 example :

SSLCipherSuite EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH

SSLProtocol All -SSLv2 -SSLv3 -TLSv1 -TLSv1.1

SSLHonorCipherOrder On

Should throw an error to the end user's browser / app / etc and mitigate any leakage.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon