DROWN SSL vulnerability

  Print

What is DROWN?

DROWN stands for Decrypting RSA with Obsolete and Weakened eNcryption. Basically the attack, like many against SSL, involves using a downgraded cipher to attack the encrypted connection and potentially steal communication data.

The attack involves taking advantage of the weak SSLv2 cipher. It requires a fair amount of computing power and a significant amount of traffic needs to be intercepted to break the cipher. The researchers have said this can be done with about $440 of Amazon EC2 power.

Is my website vulnerable?

The attack is only possible against connections supporting SSLv2. This is a very old protocol from 1995. However some systems still allow SSLv2 connections. To protect your server you should disable SSLv2. In fact we recommend disabling all SSL protocols and only using TLS. IT is worth noting while we refer to SSL Certificates these all support TLS connections. So you do not need to rush to replace your certificates.

To check if your server is vulnerable you can use the SSL Labs checker and see if SSLv2 is enabled.

But it is also worth noting that you may use your certificate for other protocols such as email servers. You need to ensure SSLv2 is disabled on these. Especially if they use the same private key. You can check if your system has been detected as vulnerable by the security researchers using the DROWN Attack website.

Do I need to re-issue my certificates?

Not really. The attack does not allow the private key to be stolen. It simply allows an attacker to decrypt a single connection.

So I just need to disable SSLv2?

Yes. In reality this should be disabled anyway since it has long since been considered insecure.

How do I disable SSLv2 in browser?

There is no browser changes required. This protocol and attack is serverside. So server admins must ensure SSLv2 is disabled.

More Information

If you want to read more about the attack and research paper take a look at the official DROWN Attack website.



Related Articles