http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
I'm glad I never used paypal...even if it means no PPV streams for me.
I'm glad I never used paypal...even if it means no PPV streams for me.
http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
I'm glad I never used paypal...even if it means no PPV streams for me.
Relax, no one has been hacked. This is an exploit of the way secure transactions on the internet are exchanged. Note that it is a type of man-in-the-middle attack, and requires an additional bit of access for the attacker, which is normally not easily gotten.
Interestingly, 'paypal' isn't our biggest worry. Your bank accounts are equally susceptible (basically anything that displays the little lock in your browser) using this attack.
At the moment, no one has been affected, no password changing is necessary/helpful, etc.
I imagine that browsers will start using TLS 1.1 (which as you saw wasn't affected), which has been out since 2006! Interestingly, Internet Explorer 8 (Win 7 only!)and Opera both support TLS 1.2, though I suspect Chrome/Firefox have made this a priority now.
Glad I could helpThis is definitely a situation where the media is taking it out of context. Until you see computer people freaking out, you can remain calm. It is like the old joke T-shirt: "Bomb Squad Technician. If you see me running, try to keep up". If we aren't running, there isn't anything to worry about!
Keane:
Thank you for interceding on this one. Yes, people are freaking out about what is in essence an EXTREMELY DIFFICULT attack to perform. It assumes a perfect scenario where the attacker has access to the traffic (i.e. via an exploited system that happens to be in the path of your traffic), as well as all the tools and time it takes to decrypt the traffic.
Trust me on this, folks knowledgeable enough to perform this attack ain't after your $400 cue purchase using PayPal. Rather, this type of attack is used for government information warfare. (Much like the RSA attack that folks like Keane and I know about, which was much more serious and affected the security of Lockheed Martin and many other government contractors/entities [i.e. affected the security of our country], but you guys here on AZB probably never heard about, because it doesn't affect you.)
And, there's already a fix for this -- Transport Layer Security (TLS) version 1.1 (which as mentioned has been out since 2006, and is supported in Microsoft Internet Explorer v8), as well as TLS v1.2, which is found in Opera, and will be found in all versions of browsers here shortly. Yes, there's an issue with *websites* supporting TLS v1.1/v1.2, but you can bet your sweet bippie that the Payment Card Industry (PCI, which all vendors accepting payment have to comply to the specifications of) will include mandatory changes to support TLS v1.1 as a minimum, otherwise they fail PCI compliance, and thus government audits. Take this from someone who performs security audits and ethical hacking. If you fail PCI Compliance, you get your credit-card-taking privileges removed from you post-haste, no ifs/ands/buts.
Although I'm keeping my eye on this one, I'm not shaking in my boots. I've seen these type of exploits announced before, where people were freaking out, and it almost always turned out to be a non-starter.
-Sean <-- sitting in his Bomb Squad T-shirt, glass of wine in one hand, pencil and pad in the other.
Glad I could helpThis is definitely a situation where the media is taking it out of context. Until you see computer people freaking out, you can remain calm. It is like the old joke T-shirt: "Bomb Squad Technician. If you see me running, try to keep up". If we aren't running, there isn't anything to worry about!