Ko te HTTPS ehara i te mea haumaru i nga wa katoa. Ka kitea nga whakaraeraetanga i roto i te 5,5% o nga pae HTTPS

Ko te HTTPS ehara i te mea haumaru i nga wa katoa. Ka kitea nga whakaraeraetanga i roto i te 5,5% o nga pae HTTPS
Ko tetahi o nga waahi o runga Alexa (porowhita pokapū), ka tiakina e HTTPS, me nga subdomains (hina) me nga whakawhirinakitanga (ma), kei roto ko nga mea whakaraerae (whakamarumaru)

I enei ra, ko te tohu hononga haumaru HTTPS kua waiho hei huanga paerewa me te tika mo tetahi paetukutuku nui. Mehemea te tiwhikete kua ngaro, tata ki nga kaitirotiro tata katoa e whakaatu ana i te whakatupato Ko te hononga ki te waahi "kaore i te haumaru" a kaua e tūtohu kia tukuna atu nga korero muna ki a ia.

Engari ka puta ko te noho mai o te "raka" i roto i te pae wāhitau e kore e mau tonu te tiaki. Te tirotiro i nga waahi 10 rangatira mai i te rarangi Alexa i whakaatu: he maha o ratou e pa ana ki nga whakaraeraetanga o te kawa SSL/TLS, te nuinga o te waa ma nga subdomains, ma te whakawhirinaki ranei. E ai ki nga kaituhi o te rangahau, ko te uaua o nga tono tukutuku hou ka tino whakanui ake i te mata whakaeke.

Nga hua rangahau

I whakahaerehia te rangahau e nga tohunga mai i te Whare Wananga o Ca' Foscari o Venice (Itari) me te Whare Wananga Hangarau o Vienna. Ka whakaatuhia e ratou he purongo taipitopito i te 40th IEEE Symposium on Security and Privacy, ka tu i Mei 20−22, 2019 i San Francisco.

Ko nga waahi HTTPS 10 runga i te raarangi a Alexa me nga kaihautu hono 000 i tirohia. I tautuhia nga whirihoranga kiripiri whakaraerae i runga i nga kaihautu 90, ara, tata ki te 816% o te katoa:

  • 4818 whakaraerae ki te MITM
  • 733 whakaraerae ki te wetemunatanga TLS katoa
  • 912 whakaraerae ki te wetemunatanga TLS wahanga

Ko nga waahi 898 e tino tuwhera ana ki te hacking, ara, ka tukuna e ratou te werohanga o nga tuhinga tuatoru, me nga waahi 977 e tango ana i nga ihirangi mai i nga wharangi ngoikore ka taea e te kaiwhaiwhai te taunekeneke.

Ko nga kairangahau e kii ana i roto i nga rauemi 898 "kua tino whakararu" ko nga toa ipurangi, ratonga putea me etahi atu waahi nui. 660 mai i te 898 nga waahi ka tango i nga tuhinga o waho mai i nga kaihautu whakaraerae: koinei te tino take o te aitua. E ai ki nga kaituhi, ko te uaua o nga tono tukutuku hou ka tino piki ake te mata whakaeke.

I kitea ano etahi atu raruraru: 10% o nga puka whakamanatanga he raruraru ki te tuku korero haumaru, e whakawehi ana i te rerenga o te kupuhipa, 412 nga waahi ka whakaaetia te haukoti i nga pihikete me te "waahanga waahi," a ko nga waahi 543 ka kaha ki te whakaeke i te pono o te pihikete (ma te subdomains. ).

Ko te raruraru ko nga tau tata nei, ko nga tikanga SSL/TLS me te rorohiko he maha nga whakaraerae kua kitea: POODLE (CVE-2014-3566), BEAST (CVE-2011-3389), CRIME (CVE-2012-4929), BREACH (CVE-2013-3587) me Heartbleed (CVE-2014-0160). Hei tiaki i a raatau, he maha nga tautuhinga e hiahiatia ana i runga i te taha o te tūmau me te taha o te kiritaki hei karo i te whakamahinga o nga putanga whakaraerae tawhito. Engari he tikanga iti noa tenei, na te mea ko enei momo whakatakotoranga ko te kowhiri mai i nga huinga maha o nga ciphers me nga tikanga, he uaua ki te maarama. Kaore i te tino marama ko nga huinga cipher me nga kawa e kiia ana "he tino haumaru."

Tautuhinga taunakitia

Karekau he tangata kua whakamanahia me te whakaae ki te rarangi o nga tautuhinga HTTPS e taunaki ana. Na, Mozilla SSL Whirihoranga Generator he maha nga whiringa whirihoranga, i runga i te taumata whakamarumaru e hiahiatia ana. Hei tauira, koinei nga tautuhinga e taunakihia ana mo te tūmau nginx 1.14.0:

Aratau hou

Ko nga kiritaki tawhito e tautokohia ana: Firefox 27, Chrome 30, IE 11 i runga Windows 7, Edge, Opera 17, Safari 9, Android 5.0, me Java 8

server {
listen 80 default_server;
listen [::]:80 default_server;

# Redirect all HTTP requests to HTTPS with a 301 Moved Permanently response.
return 301 https://$host$request_uri;
}

server {
listen 443 ssl http2;
listen [::]:443 ssl http2;

# certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
ssl_certificate /path/to/signed_cert_plus_intermediates;
ssl_certificate_key /path/to/private_key;
ssl_session_timeout 1d;
ssl_session_cache shared:SSL:50m;
ssl_session_tickets off;


# modern configuration. tweak to your needs.
ssl_protocols TLSv1.2;
ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256';
ssl_prefer_server_ciphers on;

# HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
add_header Strict-Transport-Security max-age=15768000;

# OCSP Stapling ---
# fetch OCSP records from URL in ssl_certificate and cache them
ssl_stapling on;
ssl_stapling_verify on;

## verify chain of trust of OCSP response using Root CA and Intermediate certs
ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates;

resolver <IP DNS resolver>;

....
}

Tautoko toharite

Ko nga kiritaki tawhito e tautokohia ana: Firefox 1, Chrome 1, IE 7, Opera 5, Safari 1, Windows XP IE8, Android 2.3, Java 7

server {
listen 80 default_server;
listen [::]:80 default_server;

# Redirect all HTTP requests to HTTPS with a 301 Moved Permanently response.
return 301 https://$host$request_uri;
}

server {
listen 443 ssl http2;
listen [::]:443 ssl http2;

# certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
ssl_certificate /path/to/signed_cert_plus_intermediates;
ssl_certificate_key /path/to/private_key;
ssl_session_timeout 1d;
ssl_session_cache shared:SSL:50m;
ssl_session_tickets off;

# Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
ssl_dhparam /path/to/dhparam.pem;

# intermediate configuration. tweak to your needs.
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS';
ssl_prefer_server_ciphers on;

# HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
add_header Strict-Transport-Security max-age=15768000;

# OCSP Stapling ---
# fetch OCSP records from URL in ssl_certificate and cache them
ssl_stapling on;
ssl_stapling_verify on;

## verify chain of trust of OCSP response using Root CA and Intermediate certs
ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates;

resolver <IP DNS resolver>;

....
}

Tautoko tawhito

Ko nga kiritaki tawhito e tautokohia ana: Windows XP IE6, Java 6

server {
listen 80 default_server;
listen [::]:80 default_server;

# Redirect all HTTP requests to HTTPS with a 301 Moved Permanently response.
return 301 https://$host$request_uri;
}

server {
listen 443 ssl http2;
listen [::]:443 ssl http2;

# certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
ssl_certificate /path/to/signed_cert_plus_intermediates;
ssl_certificate_key /path/to/private_key;
ssl_session_timeout 1d;
ssl_session_cache shared:SSL:50m;
ssl_session_tickets off;

# Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
ssl_dhparam /path/to/dhparam.pem;

# old configuration. tweak to your needs.
ssl_protocols SSLv3 TLSv1 TLSv1.1 TLSv1.2;
ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-ECDSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:DES-CBC3-SHA:HIGH:SEED:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!RSAPSK:!aDH:!aECDH:!EDH-DSS-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!SRP';
ssl_prefer_server_ciphers on;

# HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
add_header Strict-Transport-Security max-age=15768000;

# OCSP Stapling ---
# fetch OCSP records from URL in ssl_certificate and cache them
ssl_stapling on;
ssl_stapling_verify on;

## verify chain of trust of OCSP response using Root CA and Intermediate certs
ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates;

resolver <IP DNS resolver>;

....
}

E taunaki ana kia whakamahia i nga wa katoa te huinga cipher katoa me te putanga hou o OpenSSL. Ko te huinga ciphers i roto i nga tautuhinga tūmau e tohu ana i te kaupapa matua ka whakamahia, i runga i nga tautuhinga kiritaki.

Ko nga rangahau e whakaatu ana ko te whakauru noa i te tiwhikete HTTPS kaore e ranea. "Ahakoa kaore matou e whakahaere i nga pihikete penei i a matou i te tau 2005, a kua noho noa te 'TLS tika', ka puta ko enei mea karekau i te rawaka ki te mau i te maha o nga waahi tino rongonui," e ai ta ratou nga kaituhi o te mahi. Hei tiaki pono i te hongere i waenga i te kaimau me te kaihoko, me ata tirotiro koe i nga hanganga o o ake rohe-roto me nga kaihautu-tuatoru i tukuna mai ai nga ihirangi mo te pae. He mea tika pea te tono arotake mai i etahi kamupene tuatoru e tohunga ana ki te haumaru korero.

Ko te HTTPS ehara i te mea haumaru i nga wa katoa. Ka kitea nga whakaraeraetanga i roto i te 5,5% o nga pae HTTPS

Source: will.com