Breaking News

Micron Unveils Portfolio of Industry-First SSDs to Power the AI Revolution PlayStation announces FlexStrike wireless fight stick PlayStation Plus Monthly Games for August 2025 Creative Unveils Stage Pro Compact Soundbar Razer Launches BlackShark V3 Pro

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

LogJam Encryption Flaw Poses Risks For Web Surfers

LogJam Encryption Flaw Poses Risks For Web Surfers

Enterprise & IT May 20,2015 0

Security experts have discovered a new encryption flaw called LogJam, which is closely related to one found earlier this year that puts Web surfers' data at risk. LogJam can allow an attacker to weaken the encrypted connection between a user and a Web or email server. It actually attacks the TLS (Transport Layer Security) Protocol. The Logjam attack allows a man-in-the-middle attacker to downgrade vulnerable TLS connections to 512-bit export-grade cryptography. This allows the attacker to read and modify any data passed over the connection.

The attack is reminiscent of the FREAK (Factoring attack on RSA-EXPORT Keys) attack, which was revealed in March. However, LogJam is due to a flaw in the TLS protocol rather than an implementation vulnerability, and attacks a Diffie-Hellman key exchange rather than an RSA key exchange.

The attack affects any server that supports DHE_EXPORT ciphers, and affects all modern web browsers. 8.4% of the Top 1 Million domains were initially vulnerable.

Information on the flaw has been quietly circulating. Microsoft fixed its Internet Explorer browser last week, and patches for Firefox and Apple's Safari browser should be released soon.

What should you do?

If you have a web or mail server, you should disable support for export cipher suites and generate a unique 2048-bit Diffie-Hellman group. Step-by-step instrictions to deploy Diffie-Hellman for TLS are available here.

If you use SSH, you should upgrade both your server and client installations to the most recent version of OpenSSH, which prefers Elliptic-Curve Diffie-Hellman Key Exchange.

Web users make sure they have the most recent version of your browser installed, and check for updates frequently. Google Chrome (including Android Browser), Mozilla Firefox, Microsoft Internet Explorer, and Apple Safari are all deploying fixes for the Logjam attack.

Sysadmin or developers should make sure any TLS libraries they use are up-to-date and that they reject Diffie-Hellman Groups smaller than 1024-bit.

Tags:
Previous Post
NHK To Demonstrate 8K Super Hi-Vision Sattelite Broadcasting
Next Post
Imagination's OmniShield Enables Security For Mobile, Automotive or IoT

Related Posts

Latest News

Micron Unveils Portfolio of Industry-First SSDs to Power the AI Revolution
Enterprise & IT

Micron Unveils Portfolio of Industry-First SSDs to Power the AI Revolution

PlayStation announces FlexStrike wireless fight stick
Gaming

PlayStation announces FlexStrike wireless fight stick

PlayStation Plus Monthly Games for August 2025
Gaming

PlayStation Plus Monthly Games for August 2025

Creative Unveils Stage Pro Compact Soundbar
Consumer Electronics

Creative Unveils Stage Pro Compact Soundbar

Razer Launches BlackShark V3 Pro
Consumer Electronics

Razer Launches BlackShark V3 Pro

Popular Reviews

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Noctua NH-D15 G2

Noctua NH-D15 G2

Soundpeats Pop Clip

Soundpeats Pop Clip

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

be quiet! Pure Base 501

be quiet! Pure Base 501

Terramaster F8-SSD

Terramaster F8-SSD

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed