• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Drown bug in HTTPS puts 11 million websites at risk

Researchers warn of major flaw that can bypass HTTPS security

Digital security padlock red image
Millions of websites at risk in HTTPS 'DROWN' flaw
  • Graeme Burton
  • @graemeburton
  • 01 March 2016
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

A major flaw in the HTTPS protocol has been uncovered that may leave as many as 11 million websites at risk, as well as any other services that use SSL and TLS encryption.

The security protocols are widely used to encrypt web transactions and other highly sensitive traffic. HTTPS has also been increasingly deployed to protect people's browsing of ordinary websites in an era when more and more governments are engaging in large-scale web surveillance.

The flaw, dubbed Drown, could be used to access all kinds of sensitive information, the researchers explained in a detailed posting on a dedicated website.

"Drown allows attackers to break the encryption and read or steal sensitive communications, including passwords, credit card numbers, trade secrets and financial data. Our measurements indicate that 33 percent of all HTTPS servers are vulnerable to the attack," wrote the researchers.

The research indicates that a quarter of top-level domains deploying HTTPS and a third of all sites are vulnerable.

The flaw centres on continuing legacy support for outdated cryptography by website operators.

"Due to misconfigurations, many servers also still support SSLv2, a 1990s-era predecessor to TLS," said the researchers.

"This support did not matter in practice, since no up-to-date clients actually use SSLv2. Therefore, even though SSLv2 is known to be badly insecure, until now merely supporting SSLv2 was not considered a security problem, because clients never used it.

"[But] Drown shows that merely supporting SSLv2 is a threat to modern servers and clients. It allows an attacker to decrypt modern TLS connections between up-to-date clients and servers by sending probes to a server that supports SSLv2 and uses the same private key."

A server is vulnerable to Drown if:

  • It allows SSLv2 connections, which is surprisingly common owing to a combination of misconfiguration and inappropriate default settings. About 17 per cent of HTTPS servers still allow SSLv2 connections, according to the researchers.
  • The server's private key is used on any other server that allows SSLv2 connections, even for another protocol. Many companies reuse the same certificate and key on their web and email servers, for instance. In this case, if the email server supports SSLv2 and the web server does not, an attacker can take advantage of the email server to break TLS connections to the web server. Taking key reuse into account, some 16 percent of HTTPS servers are also vulnerable, putting a third of HTTPS servers at risk.

"To protect against Drown, server operators need to ensure that their private keys are not used anywhere with server software that allows SSLv2 connections. This includes web servers, SMTP servers, IMAP and POP servers, and any other software that supports SSL/TLS," advised the researchers.

The authors of the research are based in universities across three continents and have produced a full technical paper explaining the flaw (PDF).

To hear more about security challenges, the threats they pose and how to combat them, sign up for Computing's Enterprise Security and Risk Management conference on 24 November.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Servers
  • Web
  • encryption

V3 Latest

credit-card
Oracle hack potentially compromises almost every US credit card

Oracle attackers possibly got unlimited control over credit cards, warns security firm ERPScan

  • Security
  • 09 August 2016
Vodafone logo
Vodafone 'ends line rental charges' for fibre broadband customers

Vodafone moves first in response to regulator pressure over broadband price clarity

  • Internet
  • 09 August 2016
Weather data on smartphone
Met Office drops Google App Engine for Microsoft Azure in IoT future proofing move

PaaS with Microsoft affordable and scalable, says CIO advisor

  • Cloud Computing
  • 09 August 2016
BlackBerry DTEK50
BlackBerry DTEK50 review

Can a dazzling security suite alone make for a good phone?

  • Mobile Phones
  • 09 August 2016
blog comments powered by Disqus
Back to Top

Most read

BlackBerry DTEK50
BlackBerry DTEK50 review
credit-card
Oracle hack potentially compromises almost every US credit card
Microsoft Windows XP boxes on the assembly line in 2001
27,000 Windows XP PCs still in use at Met Police
Oracle building
Russian Carbanak cyber crooks breach 700 internal Oracle systems
iPhone 7 Plus prototype spotted in video
iPhone 7 and 7 Plus to have dual-camera tech and new home button
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016