|
|
<h1>Checks</h1>
|
|
|
<h2>Protection</h2>
|
|
|
<h3>Hard protection</h3>
|
|
|
|
|
|
<p>
|
|
|
Such protection are hard or risky to deploy but give strong protection
|
|
|
against attack.<br/>
|
|
|
Deploying such protection can just break your service for a long time if you
|
|
|
don't understand what you are doing.<br/>
|
|
|
Service using such protection really tries to protect you and really know
|
|
|
what security is.
|
|
|
</p>
|
|
|
<hr/>
|
|
|
|
|
|
<h4 id="hpkp">
|
|
|
<%= rank_label :A %>
|
|
|
HTTP Public Key Pinning (HPKP)
|
|
|
<span class="small">HTTPS only, incoming feature</span>
|
|
|
</h4>
|
|
|
|
|
|
<p>
|
|
|
HPKP protection, specified in <%= rfc_link_to 7469 %>, consists of putting
|
|
|
headers on HTTP response to specify which keys or certificats are allowe
|
|
|
for the encryption.
|
|
|
If pinning mismatches, for example because of a
|
|
|
<%= wikipedia_link_to 'man-in-the-middle attack', 'Man-in-the-middle_attack' %>
|
|
|
connection is rejected and no data at all is transfered.
|
|
|
</p>
|
|
|
|
|
|
<pre>
|
|
|
<code>
|
|
|
$ curl -sI https://cryptcheck.fr/ | grep public-key-pins
|
|
|
public-key-pins: report-uri="https://aeris.report-uri.io/r/default/hpkp/enforce"; max-age=5184000;
|
|
|
pin-sha256="wdkD38iQQzxE7g0RpmN8VoaIqX7YmPWwoueD9Iqawfg="; pin-sha256="EswdUzfH2N8sx6Nb4Vr9gamtNF5VWQxLWUG0gDIPVLw=";
|
|
|
</code>
|
|
|
</pre>
|
|
|
|
|
|
<p>
|
|
|
HPKP is difficult to deploy because has a redemption period of some days
|
|
|
(maximum allowed: 60). During this time, in case of misconfiguration,
|
|
|
returning visitors will faced a TLS error page, even if the configuration
|
|
|
was fixed.
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
|
|
|
<h3>Medium protection</h3>
|
|
|
|
|
|
<p>
|
|
|
Such protection is not so easy to deploy and can have hazardous side effects,
|
|
|
but provides quiet good protection against some attacks.<br/>
|
|
|
Broken service is unexpected or could be fixed in a small time range.<br/>
|
|
|
Using such protection is a clear sign the service try to protect you.
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
|
|
|
<h4 id="hsts">
|
|
|
<%= rank_label :A %> <%= rank_label :B %>
|
|
|
HTTP Strict Transport Security (HSTS)
|
|
|
<span class="small">HTTPS only</span>
|
|
|
</h4>
|
|
|
|
|
|
<p>
|
|
|
HSTS protection, specified in <%= rfc_link_to 6797 %>, consists of putting
|
|
|
headers on HTTP response to specify the service supports HTTPS.<br/>
|
|
|
After the first connection (HSTS is
|
|
|
"<%= wikipedia_link_to 'Trust On First Use', 'Trust_on_first_use' %>" (TOFU)),
|
|
|
the browser automatically rewrite <code>http://</code> address to
|
|
|
<code>https://</code>, avoiding a plain request (with potential data leak)
|
|
|
to be asked by the service to redirect to the <code>https://</code> address.
|
|
|
</p>
|
|
|
|
|
|
<pre>
|
|
|
<code>
|
|
|
curl -sI https://cryptcheck.fr/ | grep strict-transport-security
|
|
|
strict-transport-security: max-age=31536000; includeSubDomains; preload;
|
|
|
</code>
|
|
|
</pre>
|
|
|
|
|
|
<p>
|
|
|
To have full score on HSTS, you need to have a long <code>max-age</code>
|
|
|
period, at least 1 year (<code>31536000</code> seconds).<br/>
|
|
|
If you correctly configure your service with HSTS, you can also ask for
|
|
|
<a href="https://hstspreload.org/" target="_blank">browser preloading</a>,
|
|
|
avoiding the trouble of the first connection.
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
|
|
|
<h3>Easy protection</h3>
|
|
|
|
|
|
<p>
|
|
|
Such protection is easy to deploy and without .<br/>
|
|
|
Broken service is unexpected or could be fixed in a small time range.<br/>
|
|
|
Using such protection is a clear sign the service try to protect you.
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
|
|
|
<h4 id="aead">
|
|
|
<%= rank_label :C %>
|
|
|
Authentificated Encryption with Authenticated Data (AEAD)
|
|
|
</h4>
|
|
|
|
|
|
<p>
|
|
|
Since 2014, TLS (and SSL) suffers of
|
|
|
<a href="https://www.imperialviolet.org/2014/12/08/poodleagain.html" target="_blank">PODDLE</a>
|
|
|
vulnerability on the way padding is done during TLS handshake.
|
|
|
An attacker can play with this encrypted padding to guess underlying plain
|
|
|
data.<br/>
|
|
|
|
|
|
Any <%= wikipedia_link_to 'cipher mode operation', 'Block_cipher_mode_of_operation' %>
|
|
|
other than <%= wikipedia_link_to 'AEAD', 'Authenticated_encryption' %> is
|
|
|
vulnerable to this attack.
|
|
|
</p>
|
|
|
|
|
|
<p>
|
|
|
In practice, POODLE is a serious flaw for SSLv2/v3, which must be avoided
|
|
|
in all cases, but also for TLSv1.0/1.1.<br/>
|
|
|
Service operators must support AEAD cipher suite as soon as possible, to
|
|
|
avoid trouble when practical attack will be found on POODLE on TLS.<br/>
|
|
|
Such cipher suite is only available on TLSv1.2, so operators must disable
|
|
|
TLSv1.0 now, and TLSv1.1 as soon as possible.
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
|
|
|
<h4 id="scsv">
|
|
|
<%= rank_label :C %>
|
|
|
TLS Fallback Signaling Cipher Suite Value (SCSV)
|
|
|
</h4>
|
|
|
|
|
|
<p>
|
|
|
SCSV, specify in <%= rfc_link_to 7507 %> is a TLS extension to allow a
|
|
|
client to signal to the server a previous hanshake attempt with higher TLS
|
|
|
version was done, but unsuccessfully.<br/>
|
|
|
This way, the server can detect a downgrade attack on the line, because
|
|
|
supporting better than the current TLS version.<br/>
|
|
|
Without this signaling value, the server has no way to distinguish between
|
|
|
a client supporting TLSv1.2 but downgraded to TLSv1.1 and a client TLSv1.1
|
|
|
only.<br/>
|
|
|
For example, this feature allows blocking of downgrade attack from TLSv1.2
|
|
|
(AEAD & PFS) to TLSv1.0 (nor AEAD nor PFS) to exploit POODLE vulnerability
|
|
|
more easily.
|
|
|
</p>
|
|
|
|
|
|
<p>
|
|
|
To activate SCSV, you just need a decent OpenSSL version (1.0.1j+).
|
|
|
LibreSSL currently doesn't have support for this.
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
|
|
|
<h2>Weaknesses</h2>
|
|
|
<h3>Future weakness</h3>
|
|
|
|
|
|
<p>
|
|
|
This kind of weakness is theorical vulnerability but without practical
|
|
|
attack or with too much side effects to be able to patch it.
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
|
|
|
<h3>Current weakness</h3>
|
|
|
|
|
|
<p>
|
|
|
Such weakness knows practical attacks to break encryption.
|
|
|
Using such features is hightly discourage, and operators must take quick
|
|
|
actions to remove them.
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
|
|
|
<h4 id="tlsv1.0">
|
|
|
<%= rank_label :F %>
|
|
|
TLSv1.0
|
|
|
</h4>
|
|
|
|
|
|
<p>
|
|
|
TLSv1.0 is vulnerable to
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
|
|
|
<!--
|
|
|
<h4 id="pfs">
|
|
|
<%= rank_label :F %>
|
|
|
Perfect Forward Secrecy (PFS)
|
|
|
</h4>
|
|
|
|
|
|
<p>
|
|
|
<%= wikipedia_link_to 'PFS', 'Forward_secrecy' %> is
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
-->
|
|
|
|
|
|
<h3>Deprecated feature</h3>
|
|
|
|
|
|
<hr/>
|
|
|
|
|
|
<h4 id="ssl">
|
|
|
<%= rank_label :G %>
|
|
|
SSLv2, SSLv3
|
|
|
</h4>
|
|
|
|
|
|
<p>
|
|
|
SSLv2 and SSLv3 are deprecated SSL protocol version.<br/>
|
|
|
Pratical attacks exist to decrypt SSL encrypted traffic to plain text in
|
|
|
some minutes with standard computer.
|
|
|
For SSLv3, it's
|
|
|
<a href="https://security.googleblog.com/2014/10/this-poodle-bites-exploiting-ssl-30.html" target="_blank">POODLE</a>
|
|
|
again.
|
|
|
For SSLv2, it's was supposed to never be in production because too bad and
|
|
|
broken cryptography under the hood.
|
|
|
<a href="https://drownattack.com/" target="_blank">DROWN</a> vulnerability
|
|
|
allows an attacker to decrypt encrypted traffic (even TLSv1.2!) as soon as
|
|
|
one of the servers used for the service supports SSLv2 with the same key.
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
|
|
|
<!--
|
|
|
<h4 id="rc4">
|
|
|
<%= rank_label :G %>
|
|
|
RC4
|
|
|
</h4>
|
|
|
|
|
|
<p>
|
|
|
<%= wikipedia_link_to 'RC4', 'RC4' %> is a stream cipher, recently known to
|
|
|
have
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
-->
|
|
|
|
|
|
<h4 id="sha1">
|
|
|
<%= rank_label :E %> <%= rank_label :G %>
|
|
|
SHA-1
|
|
|
<span class="small">incoming feature for HMAC</span>
|
|
|
</h4>
|
|
|
|
|
|
<p>
|
|
|
<%= wikipedia_link_to 'SHA-1', 'SHA-1' %> is a cryptographic hash function
|
|
|
used in TLS cipher suite.
|
|
|
<a href="https://shattered.io/" target="_blank">It was broken</a> in 2016.
|
|
|
</p>
|
|
|
|
|
|
<p>
|
|
|
SHA-1 is used in two parts of the handshake.<br/>
|
|
|
For <%= wikipedia_link_to 'HMAC', 'Hash-based_message_authentication_code' %>,
|
|
|
which protect each messages exchanged during handshake. Because lifetime of
|
|
|
such HMAC is very short (TCP/IP round trip), SHA-1 collision is not a real
|
|
|
trouble on this part.<br/>
|
|
|
For key exchange and authentication. Each certificate is signed by the issuer
|
|
|
certificate using a digest.
|
|
|
In this case, if SHA-1 digest is used and because certificate lifetime is
|
|
|
long (years to decades), collision on digest could allow an attacker to
|
|
|
forge a rogue certificate which match the real certificate digest, and so
|
|
|
to impersonate the TLS service behind.
|
|
|
</p>
|
|
|
|
|
|
<p>
|
|
|
SHA-1 signed certificates must be banned.<br/>
|
|
|
SHA-1 HMAC is currently quite safe, but operators must take action to ensure
|
|
|
SHA-2 compatibility with clients in case if SHA-1 must be revoked even for
|
|
|
HMAC.
|
|
|
</p>
|
|
|
|
|
|
<hr/>
|
|
|
|
|
|
<h4 id="digest">
|
|
|
<%= rank_label :G %>
|
|
|
MD-5, MD-4, MD-2, MDC-2
|
|
|
</h4>
|
|
|
|
|
|
<p>
|
|
|
MD-5, MD-4, MD-2 and MDC-2 are completely broken hash function.
|
|
|
Just don't use it.
|
|
|
</p>
|
|
|
|
|
|
<h4 id="compression">
|
|
|
<%= rank_label :G %>
|
|
|
Compression
|
|
|
<span class="small">incoming feature</span>
|
|
|
</h4>
|
|
|
|
|
|
<p>
|
|
|
With TLS compression activated, some oracle attacks allow to decrypt the
|
|
|
content.
|
|
|
For example the
|
|
|
<a href="https://arstechnica.com/information-technology/2013/08/gone-in-30-seconds-new-attack-plucks-secrets-from-https-protected-pages/" target="_blank">BREACH</a>
|
|
|
or
|
|
|
<a href="https://threatpost.com/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312/77006/" target="_blank">CRIME</a>
|
|
|
attacks.
|
|
|
</p>
|
|
|
|
|
|
<p>
|
|
|
TLS compression must be disabled on the service.
|
|
|
</p>
|
|
|
|