Aon de na prìomh làraich aig Alexa (cearcall sa mheadhan), air a thèarainntachadh le HTTPS, le fo-roinnean (liath) agus eisimeileachd (geal), nam measg tha feadhainn so-leònte (sgàineadh briste)
An-diugh, tha ìomhaigh ceangail tèarainte HTTPS air a thighinn gu bhith na inbhe àbhaisteach agus eadhon na fheart riatanach de dhroch làrach sam bith. Ma tha
Ach tha e a 'tionndadh a-mach nach eil làthaireachd "glas" anns a' bhàr seòlaidh daonnan a 'gealltainn dìon.
Toraidhean rannsachaidh
Chaidh an sgrùdadh a dhèanamh le eòlaichean bho Oilthigh Venice Ca’ Foscari (an Eadailt) agus Oilthigh Teicnigeach Vienna. Bheir iad seachad aithisg mhionaideach aig an 40mh Symposium IEEE air Tèarainteachd is Dìomhaireachd, a thèid a chumail Cèitean 20-22, 2019 ann an San Francisco.
Chaidh deuchainn a dhèanamh air na prìomh làraich HTTPS 10 liosta Alexa agus 000 luchd-aoigheachd co-cheangailte. Chaidh rèiteachadh criptografach so-leònte a lorg air luchd-aoigheachd 90, is e sin, timcheall air 816% den iomlan:
- 4818 so-leònte gu MITM
- Tha 733 ann an cunnart bho làn dhì-chrioptachadh TLS
- Tha 912 ann an cunnart bho dhì-chrioptachadh pàirt TLS
Tha làraich 898 gu tur fosgailte airson slaodadh, is e sin, tha iad a’ ceadachadh sgriobtaichean neo-àbhaisteach a thoirt a-steach, agus bidh làraich 977 a’ luchdachadh susbaint bho dhuilleagan le droch dhìon a dh’ fhaodas neach-ionnsaigh eadar-obrachadh leotha.
Tha an luchd-rannsachaidh a’ daingneachadh gu bheil stòran air-loidhne, seirbheisean ionmhais agus làraich mòra eile am measg nan goireasan 898 “gu tur ann an cunnart”. Bidh 660 a-mach à 898 làrach a’ luchdachadh sìos sgriobtaichean bhon taobh a-muigh bho luchd-aoigheachd so-leònte: is e seo am prìomh thùs cunnairt. A rèir nan ùghdaran, tha iom-fhillteachd iarrtasan lìn an latha an-diugh a 'meudachadh gu mòr an uachdar ionnsaigh.
Chaidh duilgheadasan eile a lorg cuideachd: tha duilgheadasan aig 10% de fhoirmean cead le sgaoileadh fiosrachaidh tèarainte, a tha a’ bagairt faclan-faire a leigeil a-mach, tha 412 làrach a’ ceadachadh eadar-ghabhail bhriosgaidean agus fuadach seisean, agus tha 543 làrach fo smachd ionnsaighean air ionracas bhriosgaid (tro subdomains) .
Is e an duilgheadas a th 'ann gu bheil o chionn beagan bhliadhnaichean anns na protocols SSL / TLS agus bathar-bog
Suidhichidhean air am moladh
Chan eil duine air aontachadh gu h-oifigeil agus air aontachadh air liosta de na roghainnean HTTPS a chaidh a mholadh. Mar sin,
Modh ùr-nodha
Na cleachdaichean as sine le taic: Firefox 27, Chrome 30, IE 11 air Windows 7, Edge, Opera 17, Safari 9, Android 5.0, agus Java 8
server {
listen 80 default_server;
listen [::]:80 default_server;
# Redirect all HTTP requests to HTTPS with a 301 Moved Permanently response.
return 301 https://$host$request_uri;
}
server {
listen 443 ssl http2;
listen [::]:443 ssl http2;
# certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
ssl_certificate /path/to/signed_cert_plus_intermediates;
ssl_certificate_key /path/to/private_key;
ssl_session_timeout 1d;
ssl_session_cache shared:SSL:50m;
ssl_session_tickets off;
# modern configuration. tweak to your needs.
ssl_protocols TLSv1.2;
ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256';
ssl_prefer_server_ciphers on;
# HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
add_header Strict-Transport-Security max-age=15768000;
# OCSP Stapling ---
# fetch OCSP records from URL in ssl_certificate and cache them
ssl_stapling on;
ssl_stapling_verify on;
## verify chain of trust of OCSP response using Root CA and Intermediate certs
ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates;
resolver <IP DNS resolver>;
....
}
Taic meadhanach
Na cleachdaichean as sine le taic: Firefox 1, Chrome 1, IE 7, Opera 5, Safari 1, Windows XP IE8, Android 2.3, Java 7
server {
listen 80 default_server;
listen [::]:80 default_server;
# Redirect all HTTP requests to HTTPS with a 301 Moved Permanently response.
return 301 https://$host$request_uri;
}
server {
listen 443 ssl http2;
listen [::]:443 ssl http2;
# certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
ssl_certificate /path/to/signed_cert_plus_intermediates;
ssl_certificate_key /path/to/private_key;
ssl_session_timeout 1d;
ssl_session_cache shared:SSL:50m;
ssl_session_tickets off;
# Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
ssl_dhparam /path/to/dhparam.pem;
# intermediate configuration. tweak to your needs.
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS';
ssl_prefer_server_ciphers on;
# HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
add_header Strict-Transport-Security max-age=15768000;
# OCSP Stapling ---
# fetch OCSP records from URL in ssl_certificate and cache them
ssl_stapling on;
ssl_stapling_verify on;
## verify chain of trust of OCSP response using Root CA and Intermediate certs
ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates;
resolver <IP DNS resolver>;
....
}
Seann taic
Na cleachdaichean as sine le taic: Windows XP IE6, Java 6
server {
listen 80 default_server;
listen [::]:80 default_server;
# Redirect all HTTP requests to HTTPS with a 301 Moved Permanently response.
return 301 https://$host$request_uri;
}
server {
listen 443 ssl http2;
listen [::]:443 ssl http2;
# certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
ssl_certificate /path/to/signed_cert_plus_intermediates;
ssl_certificate_key /path/to/private_key;
ssl_session_timeout 1d;
ssl_session_cache shared:SSL:50m;
ssl_session_tickets off;
# Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
ssl_dhparam /path/to/dhparam.pem;
# old configuration. tweak to your needs.
ssl_protocols SSLv3 TLSv1 TLSv1.1 TLSv1.2;
ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-ECDSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:DES-CBC3-SHA:HIGH:SEED:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!RSAPSK:!aDH:!aECDH:!EDH-DSS-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!SRP';
ssl_prefer_server_ciphers on;
# HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
add_header Strict-Transport-Security max-age=15768000;
# OCSP Stapling ---
# fetch OCSP records from URL in ssl_certificate and cache them
ssl_stapling on;
ssl_stapling_verify on;
## verify chain of trust of OCSP response using Root CA and Intermediate certs
ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates;
resolver <IP DNS resolver>;
....
}
Thathas a’ moladh gun cleachd thu an-còmhnaidh an t-sreath cipher slàn agus an dreach as ùire de OpenSSL. Bidh an t-sreath cipher ann an roghainnean an fhrithealaiche a’ sònrachadh a’ phrìomhachais anns an tèid an cleachdadh, a rèir roghainnean an neach-dèiligidh.
Tha rannsachadh a’ sealltainn nach eil e gu leòr dìreach teisteanas HTTPS a chuir a-steach. “Ged nach bi sinn a’ làimhseachadh briosgaidean mar a rinn sinn ann an 2005, agus ‘TLS reusanta’ air fàs cumanta, tha e a’ tionndadh a-mach nach eil na rudan bunaiteach sin gu leòr gus àireamh iongantach mòr de làraich air a bheil fèill mhòr a dhèanamh tèarainte, ”
Source: www.habr.com