Link to home
Start Free TrialLog in
Avatar of sunhux
sunhux

asked on

SSL/TLS renegotiation vulnerability: how to disable on webservers & mitigations

I think this vulnerability has CVE# CVE-2009-3555.

Q1:
Besides IPS (which some vendor don't have signatures for it as I was told the nature of
detection logic is still rather lacking though I don't know how Deep Security managed
to produce a signature for it in 2009), what are the ways to mitigate?

Q2:
I was told web servers with ssl/openssl can be configured such that they are not vulnerabile.
Kindly provide detailed steps on how to do this for Apache (& Oracle Web server) & IIS

Q3:
I was told modern browsers are protected against it: kindly let me know any specific settings
we need to set in IE, Firefox & Chrome to protect against this or is this something built into
the browser?


L09 - SSL / TLS renegotiation vulnerability
================================
The server encrypts traffic using SSL / TLS, but allows a client to renegotiate the connection after the initial handshake.  As the server does not appear to limit the number of renegotiations for a single SSL / TLS connection, a client may open several simultaneous connections and repeatedly renegotiate them, which may possibly lead to a DoS condition
SOLUTION
Avatar of David Johnson, CD
David Johnson, CD
Flag of Canada image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of sunhux
sunhux

ASKER

Ok, for Apache, is there a specific command to fix this?  Was told by Redhat
they don't release patches for it, so have to do a certain configuration in
Apache to address it,  any idea how this is done?
Avatar of sunhux

ASKER

Correction:

Was told by Redhat  they don't release patches for it (ie for RHEL 5.x)
though they did release patches for RHEL 6.x for Apache
ASKER CERTIFIED SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial