Solved

Various banks online banking still use TLSv1.0 : what's acceptable?

Posted on 2016-11-05
5
173 Views
Last Modified: 2016-11-08
When scanning various banks online sites from https://www.ssllabs.com/ssltest/  ,
the result indicates they are still using TLSv1.0  (besides 1.1 & 1.2) :

https://internet-banking.dbs.com.sg/IB/Welcome
https://pib.uob.com.sg/PIBLogin/Public/processPreCapture.do?keyId=lpc
https://www.citibank.com.sg/SGGCB/JSO/signon/DisplayUsernameSignon.do

Result for citi:
https://www.ssllabs.com/ssltest/analyze.html?d=www.citibank.com.sg

Thought TLSv1.0 is deprecated as of last Jun/Jul & v1.1 is till mid next year?
Some PT scannners report v1.0 as with BEAST attack vulnerability while
v1.1 has some other vulnerability.

Refer to attached screen which gives the scan output of Citi:
does the green color on TLSv1.2 mean it will be used first & will fallback to
v1.1/1.0 if the browser/client doesn't support it?

If this is a fallback situation, is it secure?
SSLTLScanCiti.png
0
Comment
Question by:sunhux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 64

Accepted Solution

by:
btan earned 250 total points
ID: 41875335
The main issue with TLS 1.0 is due to weak cipher and hash (HMAC) used such as DES, MD5 and SHA. Futhermore it should support PFS  that requires DH and EDH instead of RSA.

It will not be secure if server allows the fallback to TLS1.0 due client support. The fallback is susceptible to man in the middle attack. See this review of the various related vulnerabilities.

https://www.contextis.com/resources/blog/manually-testing-ssltls-weaknesses-2016-edition/

Though TLS 1.0 is still widely used as the 'best' protocol by a lot of browsers that are not patched to the very latest version. It suffers from CBC Chaining attacks and Padding Oracle attacks. The latest browsers are not supporting TLSv1.0. So it should only be used after risk analysis and acceptance. Note that PCI DSS 3.1 prohibits use of TLS 1.0 after June 30, 2016.
0
 

Author Comment

by:sunhux
ID: 41875366
Thanks  so all those online banking sites are overdue in disabling TLSv1.0?  Or they left it there to support older clients / browsers ?
0
 
LVL 28

Assisted Solution

by:Dr. Klahn
Dr. Klahn earned 125 total points
ID: 41875376
Both are true.  Ideally TLS V1.0 should have been disabled as soon as new browsers became available that supported better methods.

But ... in the real world there are still people using Windows 98 machines on dial-up, who will never update their systems or their browsers.  Telling a client "We no longer support your system" is a quick way to lose customers to a bank that permits sessions using any -- or no -- security, but has an internet use agreement that says "If you use outdated software and you lose money, it's not our problem."
0
 
LVL 64

Assisted Solution

by:btan
btan earned 250 total points
ID: 41875395
Yes, supposedly not to use the TLS 1.0 and not to downgrade to support legacy clients. Reality is that there are still these group of incompatible which you probably have to "let go" otherwise be prepared to face the audit and testing finding to justify this support. Risk measured decision.

There is past NIST paper on the client in which the higher TLS version need to be configured in preference if they are supported at the server, which currently most are mandated to do it - in my environment it has strict rule on this
Version Support

a. The client shall be configured to support TLS version 1.1.
b. The client should be configured to support TLS version 1.2.
c. The client may be configured to support TLS version 1.0.
d. If TLS version 1.0 is supported, the client shall be configured to prefer TLS
1.1 and TLS 1.2 over TLS 1.0.
e. The client shall not be configured to support SSL version 3.0 or earlier.
0
 
LVL 17

Assisted Solution

by:Learnctx
Learnctx earned 125 total points
ID: 41876140
Yes, TLS1.0 should be disabled. But this is the real world and in the real world while supporting TLS1.0 might not be ideal it is necessary. If you look at the case for Android alone, around ~20% of Android devices either only support TLS1.0 or by default don't have TLS1.1 and TLS1.2 enabled by default (pre-KitKat devices). So what do you do right?
0

Featured Post

Ready to get started with anonymous questions?

It's easy! Check out this step-by-step guide for asking an anonymous question on Experts Exchange.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question