SSL

Secure Apache HTTPD from POODLE

If you are running Apache, as I do you may want to take steps to secure your system but making a slight adjustment to your configuration.

By adding the simply line:

The file location: /etc/apache2

The file name: apache2.conf

Remember to always backup a configuration file before making changes.

Once completed restart apache:  service apache2 restart or /etc/init.d/apache2 restart

 

Tech Short: Let’s test for POODLE or SSLv3

First thing that came to my mind when reading about POODLE was how can I test, followed by what to do to patch/fix this.

So the first thing is to test for the vulnerability. And from all I have read so far is that you are vulnerable if your servers support SSLv3. I am confident that many of the ones I manage do; so lets test this out.

First thing I did was log into my Greyhat Test Box, thank you Kali Linux. Note: this could be any Linux distribution I just wanted to plug those guys/and/gals.

At the command line we will be using the OpenSSL tools to test by typing the following:

If this connects you have SSLv3 enabled, if it failed then you will see:

So if you run a server check out the following links:

Microsoft:
https://technet.microsoft.com/library/security/3009008.aspx

Apache:
http://httpd.apache.org/docs/2.2/ssl/ssl_faq.html#msie

Tomcat:
http://tomcat.apache.org/tomcat-6.0-doc/apr.html#HTTPS

Nginx:
http://nginx.com/blog/nginx-poodle-ssl/

And for the end users, disable SSL 3.0 in your browser, avoid MITM attack by using a VPN connection and always, always use HTTPS.

 

Security News – POODLE Security Vulnerability

On Tuesday, October 14, 2014, Google researchers announced the discovery of a vulnerability that affects systems with SSL 3.0 enabled. This vulnerability has been named POODLE (Padding Oracle On Downgraded Legacy Encryption). Details are available at https://www.openssl.org/~bodo/ssl-poodle.pdf.

It has been strongly encouraged to discontinue the use of SSL 3.0.

Info Sources

http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html

 

Man-in-the-Middle (MITM)

You are on vacation or spending the weekend at the beach. Like normal your using your laptop or smartphone.  You may be computer savvy; so you don’t allow onlookers view you typing your secure passwords.

But its not those that you can see you need to worry about.

Its the person watching your network activity; logging every site you visit, logging you bank credentials,  email, home address , contacts (friend lists), and anything else s/he can obtain. The ultimate eavesdropper.

This persons mission; to steal data from you, about you. This is the man(or woman) in the middle (MITM).

The man-in-the-middle will use many tools and security vulnerabilities which are exploited to allow them to see your data as clear as looking at it on your screen.  More so they can see your passwords even when they are all dotted out from the naked eye.

The MITM can inject code into your session to redirect you to fake sites, they can even see what you are viewing in real time.

Attackers use non-secured log-ins to apps on your phone and web sites you visit to obtain data about you.

So how do I protect myself from this?

There are many solutions; the best methods are to always use applications (apps) on your phone that use secure connections to the services it connects to.  This may be a shock to you; many do not, and this is part of the problem.

Always use sites that are secured with HTTPS from start to finish.  Again, many do not, and this leaves you exposed.

If and when possible use a VPN (virtual private network) solution.

This is another form of protection as your communication is sent encrypted threw a network you trust to be more secure than the one you are presently on.

So best advice I can offer you is

  • Be aware of the sites you visit
  • Ensure the sites you use , are using SSL
  • Be sure the apps you choose to use, are using SSL
  • Get a VPN Solution
  • And change your passwords often
  • And don’t use the same password for everything

 

 

Firefox: Add a Trusted Certificate Authority

By default Firefox has its own certificate store from well-know and trusted commercial Certificate Authorities. So today when I pushed out an internal self signed certificate; Firefox did not reconcile it as valid.

To correct this issue I did the following:

  • Launched Firefox
  • Opened the options panel and selected Advanced
  • Selected View Certificates to access the Certificate Manager
  • Then by clicking Import and browsing to your exported CA Cert you can import the internal certificate.

I hope this helps.