Content deleted Content added
Sonajourney (talk | contribs) m Changed "difficult" to "difficulty" |
→See also: added Twirl, a proposed device in 2003 that could factor 1024-bit moduli |
||
(60 intermediate revisions by 43 users not shown) | |||
Line 1:
{{Short description|Security vulnerability in Diffie–Hellman key exchange}}
'''Logjam''' is a [[Vulnerability (computing)|security vulnerability]] in systems that use [[Diffie–Hellman key exchange]] with the same prime number. It was discovered by a team of computer scientists and publicly reported on May 20, 2015.<ref name="paper">{{cite web |url=https://weakdh.org |title=The Logjam Attack |website=weakdh.org |date=2015-05-20 |access-date=2015-05-20 |archive-date=2021-03-29 |archive-url=https://web.archive.org/web/20210329172612/https://weakdh.org/ |url-status=live }}</ref> The discoverers were able to demonstrate their attack on 512-bit ([[export of cryptography from the United States|US export-grade]]) DH systems. They estimated that a state-level attacker could do so for 1024-bit systems, then widely used, thereby allowing decryption of a significant fraction of Internet traffic. They recommended upgrading to at least 2048 bits for shared prime systems.<ref>{{cite web |url=https://arstechnica.com/security/2015/05/https-crippling-attack-threatens-tens-of-thousands-of-web-and-mail-servers/ |title=HTTPS-crippling attack threatens tens of thousands of Web and mail servers |author=Dan Goodin |website=[[Ars Technica]] |date=2015-05-20 |access-date=2022-04-30 |archive-date=2017-05-19 |archive-url=https://web.archive.org/web/20170519130937/https://arstechnica.com/security/2015/05/https-crippling-attack-threatens-tens-of-thousands-of-web-and-mail-servers/ |url-status=live }}</ref><ref>{{cite news |url=https://www.zdnet.com/article/logjam-security-flaw-leaves-tens-of-thousands-of-https-websites-vulnerable/ |title=Logjam security flaw leaves top HTTPS websites, mail servers vulnerable |author=Charlie Osborne |work=[[ZDNet]] |date=2015-05-20 |access-date=2015-05-23 |archive-date=2015-05-23 |archive-url=https://web.archive.org/web/20150523004129/http://www.zdnet.com/article/logjam-security-flaw-leaves-tens-of-thousands-of-https-websites-vulnerable/ |url-status=live }}</ref><ref>{{cite news|url=https://www.wsj.com/articles/new-computer-bug-exposes-broad-security-flaws-1432076565|title=New Computer Bug Exposes Broad Security Flaws|work=The Wall Street Journal|first=Jennifer|last=Valentino-DeVries|date=2015-05-19|url-access=subscription|access-date=2022-04-30|archive-date=2022-02-24|archive-url=https://web.archive.org/web/20220224011050/https://www.wsj.com/articles/new-computer-bug-exposes-broad-security-flaws-1432076565|url-status=live}}</ref>
==Details==
Diffie–Hellman key exchange depends for its security on the presumed
One
| title = CVE-2015-4000
| publisher = The MITRE Corporation
| work = Common Vulnerabilities and Exposures List
| date = 2015-05-15
| url = https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
| access-date = 2015-06-16
| archive-date = 2015-08-11
| archive-url = https://web.archive.org/web/20150811065219/http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
| url-status = live
"The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the 'Logjam' issue."</ref>
The authors also estimated the feasibility of the attack against 1024
Claims on the practical implications of the attack were however disputed by security researchers Eyal Ronen and [[Adi Shamir]] in their paper "Critical Review of Imperfect Forward Secrecy".<ref>{{Cite web | url=http://www.wisdom.weizmann.ac.il/~eyalro/RonenShamirDhReview.pdf | first1=Eyal | last1=Ronen | first2=Adi | last2=Shamir | title=Critical Review of Imperfect Forward Secrecy | date=October 2015 | journal= | access-date=2022-04-30 | archive-date=2021-12-11 | archive-url=https://web.archive.org/web/20211211100114/https://www.wisdom.weizmann.ac.il/~eyalro/RonenShamirDhReview.pdf | url-status=live }}</ref>
== Responses ==
* On May 12, 2015, Microsoft released a patch for [[Internet Explorer]].<ref>{{cite web▼
▲* On May 12, 2015, Microsoft released a patch for [[Internet Explorer]].<ref>
| url=https://technet.microsoft.com/en-us/library/security/ms15-055.aspx
| title=Microsoft Security Bulletin MS15-055. Vulnerability in Schannel Could Allow Information Disclosure (3061518)
Line 16 ⟶ 28:
| publisher=[[Microsoft Corporation]]
| quote=This security update resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed Logjam technique, [...] The security update addresses the vulnerability by increasing the minimum allowable DHE key length to 1024 bits.
| access-date=2015-07-02
▲}}</ref>
| archive-date=2015-07-03
| archive-url=https://web.archive.org/web/20150703021850/https://technet.microsoft.com/en-us/library/security/ms15-055.aspx
| url-status=live
}}</ref>▼
* On June 16, 2015, the [[Tor Project]] provided a patch for Logjam to the [[Tor Browser]].<ref>{{cite web|url=https://blog.torproject.org/blog/tor-browser-452-released|title=Tor Browser 4.5.2 is released|first=Mike|last=Perry|date=2015-06-16|publisher=The Tor Project|access-date=2015-06-20|archive-date=2015-06-20|archive-url=https://web.archive.org/web/20150620224433/https://blog.torproject.org/blog/tor-browser-452-released|url-status=live}}</ref>
* On June 30, 2015, [[Apple Inc.|Apple]] released a patch for both [[OS X Yosemite]] and [[iOS 8]] operating system.<ref>
{{cite web
| url=https://support.apple.com/HT204942
| title=About the security content of OS X Yosemite v10.10.4 and Security Update 2015-005
| date=23 January 2017
| publisher=[[Apple Inc.]]
| quote=This issue, also known as Logjam, [...] was addressed by increasing the default minimum size allowed for DH ephemeral keys to 768 bits.
Line 30 ⟶ 46:
| url=https://support.apple.com/HT204941
| title=About the security content of iOS 8.4
| date=18 August 2020
| publisher=[[Apple Inc.]]
| quote=This issue, also known as Logjam, [...] was addressed by increasing the default minimum size allowed for DH ephemeral keys to 768 bits.
}}
</ref>
* On June 30, 2015, the [[Mozilla]] project released a fix for the [[Firefox]] browser.<ref>{{cite web
| title=Mozilla Foundation Security Advisory 2015-70 - NSS accepts export-length DHE keys with regular DHE cipher suites
| publisher=[[Mozilla]]
| url=https://www.mozilla.org/en-US/security/advisories/mfsa2015-70/
| quote=FIXED IN Firefox 39.0 [...] This attack [...] is known as the "Logjam Attack." This issue was fixed in NSS version 3.19.1 by limiting the lower strength of supported DHE keys to use 1023 bit primes.
| access-date=2015-07-04
| archive-date=2015-07-07
▲</ref>
| archive-url=https://web.archive.org/web/20150707033751/https://www.mozilla.org/en-US/security/advisories/mfsa2015-70/
| url-status=live
}}</ref>▼
* On September 1, 2015, Google released a fix for the [[Google Chrome|Chrome]] browser.<ref>{{cite web|url=http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html|title=Stable Channel Updates|website=Chrome Releases|first=Vivian|last=Zhi|date=2015-09-01|accessdate=2015-11-06|archive-date=2015-10-16|archive-url=https://web.archive.org/web/20151016103016/http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html|url-status=live}}</ref>
* On December 6, 2017, [[Internet Engineering Task Force|IETF]] published {{IETF RFC|8270}} called "Increase the Secure Shell Minimum Recommended Diffie-Hellman Modulus Size to 2048 Bits".
▲</ref>
== See also ==
Line 55 ⟶ 70:
* [[POODLE]]
* [[Server-Gated Cryptography]]
* [[TWIRL]]
== References ==
{{reflist|40em}}
==External links==
* [https://weakdh.org/ The Logjam Attack]
* [https://www.scottaaronson.com/blog/?p=2293 NSA in P/poly: The Power of Precomputation-Shtetl Optimizedl]
{{SSL/TLS}}
Line 68 ⟶ 83:
[[Category:Web security exploits]]
[[Category:Attacks on public-key cryptosystems]]
[[Category:2015 in
[[Category:Transport Layer Security]]
[[Category:Computational hardness assumptions]]
|