Results (
Vietnamese) 1:
[Copy]Copied!
We present DROWN, a novel cross-protocol attack onTLS that uses a server supporting SSLv2 as an oracle todecrypt modern TLS connections.We introduce two versions of the attack. The moregeneral form exploits multiple unnoticed protocol flawsin SSLv2 to develop a new and stronger variant of theBleichenbacher RSA padding-oracle attack. To decrypt a2048-bit RSA TLS ciphertext, an attacker must observe1,000 TLS handshakes, initiate 40,000 SSLv2 connections,and perform 250 offline work. The victim clientnever initiates SSLv2 connections. We implemented theattack and can decrypt a TLS 1.2 handshake using 2048-bit RSA in under 8 hours, at a cost of $440 on AmazonEC2. Using Internet-wide scans, we find that 33% of allHTTPS servers and 22% of those with browser-trustedcertificates are vulnerable to this protocol-level attack dueto widespread key and certificate reuse.
Being translated, please wait..
