Protocol flaws and new cryptanalysis in public key cryptography (CVE-2015-4000 aka LogJam)

The Ubuntu Security Team is aware of the recent paper that has raised issues about the safety of the Diffie-Hellman key negotiation protocol. The authors raise multiple points:

  1. Many systems are still configured to allow use of "export-grade" ciphers, such as 512-bit Diffie-Hellman groups. A machine-in-the-middle attack could use a design flaw in the TLS protocol to downgrade connections to "export-grade" levels. This issue was assigned CVE-2015-4000.

    • Researchers have demonstrated a successful attack against a 512-bit Diffie-Hellman shared parameter.
  2. Diffie-Hellman implementations often use standardized or commonly-used shared parameters. This use was considered safe until this paper, as the cost of breaking the cipher suite is expensive. However, this paper demonstrates a way to build a database of information for a given set of parameters that allows passive eavesdroppers to quickly and cheaply derive the negotiated keys for any specific connection. Amortizing the cost of computing the database across millions of potential targets makes this attack relatively affordable.
    • It is suspected that researchers could perform these attacks against 768-bit shared parameters and that nation-state actors have the resources and abilities to perform these attacks against popularly-deployed 1024-bit shared parameters.
    • Use of hard-coded parameters is so ubiquitous that a solution will necessarily be long-term.

Expected responses of upstream projects

A complete response to the issues raised here will require a gradual transition of protocols, services, and configurations:

Other toolkits will probably also drop support for export-grade cipher suites.

Other cryptographic toolkits will probably also phase out support for small parameters soon.

Ubuntu's Response

The response to Logjam in Ubuntu is under review. This page will be updated as decisions are made. The following actions have already been taken:

Mitigation

System administrators can react immediately:

Instructions on these steps for popular services such as Apache, nginx, Lighttpd, Tomcat, Postfix, Sendmail, Dovecot, and HAProxy have been published on the official Logjam site. Note: Some of the instructions may rely on features added in newer versions of the software than packaged for Ubuntu; we may backport patches to enable using different Diffie-Hellman parameters.

Typical Ubuntu users will see most benefit from installing package updates as they are released. Updated browsers may cause some websites to be unavailable until affected websites start supporting stronger cipher suites.

More information

Timeline


CategoryTemplate

SecurityTeam/KnowledgeBase/LogJam (last edited 2022-01-05 12:38:23 by rodrigo-zaiden)