아래와 같은 공격이 있다네요.. 혹시모르니 인스톨된 openssl을 확인해보시고 security fix된 버젼으로 업데이트 하세요 ^^
그리고 인증방식을 패스워드 방식은 불허하고 Public Key 인증방식 등을 이용하시면 보다 안전할지도 모르겠네요
### openssl: protocol downgrade attack ###
Date: Wed, 19 Oct 2005 14:57:03 +0200
From: Marcus Meissner <meissner@suse.de>
To: suse-security-announce@suse.com
Subject: [suse-security-announce] SUSE Security Announcement: openSSL protocol downgrade attack (SUSE-SA:2005:061)
1) Problem Description and Brief Discussion
The openssl cryptographic libraries have been updated to fix
a protocol downgrading attack which allows a man-in-the-middle
attacker to force the usage of SSLv2. This happens due to the
work-around code of SSL_OP_MSIE_SSLV2_RSA_PADDING which is included
in SSL_OP_ALL (which is commonly used in applications). (CAN-2005-2969)
Additionally this update adds the Geotrusts Equifax Root1 CA certificate
to allow correct certification against Novell Inc. websites and
services. The same CA is already included in Mozilla, KDE, and curl,
which use separate certificate stores.
2) Solution or Work-Around
Please install the updated packages.
A work-around would be to disable SSL v2 support in the applications.
3) Special Instructions and Notes
Restart all services using SSL communication.
최근 배포된 SUSE Linux 10에도 포함되는 내용이기에 어지간한 다른 배포본도 해당사항이 있으리라 보여요...
확인은 안해봤지만요 ^^
댓글 11개
공격들어 온다고 안쓰신다는 것은 헤헤~ 구더기 무서워서 장 못 담근다는 이치 아닐까요..
그냥 농담입니다.. 헤헤 즐거운 하루 보내십시오.
좀 갈켜주세요. FTP루 하나요?
로그에 보니 무작위 패스워드로 계속공격하다가 안되니깐..랜을 건드리더군요...
그래서 한동안 서버 접속이 안됬다는~
말씀하신 brute force 식의 공격은 어디가나 있는 건데요...
더 안전한건 서버 앞에서 직접 작업 하는 거겠죠..;;;
서버앞에서 작업할 환경이면 ssh 쓰지도 안겠지만요..
그리고 인증방식을 패스워드 방식은 불허하고 Public Key 인증방식 등을 이용하시면 보다 안전할지도 모르겠네요
### openssl: protocol downgrade attack ###
Date: Wed, 19 Oct 2005 14:57:03 +0200
From: Marcus Meissner <meissner@suse.de>
To: suse-security-announce@suse.com
Subject: [suse-security-announce] SUSE Security Announcement: openSSL protocol downgrade attack (SUSE-SA:2005:061)
1) Problem Description and Brief Discussion
The openssl cryptographic libraries have been updated to fix
a protocol downgrading attack which allows a man-in-the-middle
attacker to force the usage of SSLv2. This happens due to the
work-around code of SSL_OP_MSIE_SSLV2_RSA_PADDING which is included
in SSL_OP_ALL (which is commonly used in applications). (CAN-2005-2969)
Additionally this update adds the Geotrusts Equifax Root1 CA certificate
to allow correct certification against Novell Inc. websites and
services. The same CA is already included in Mozilla, KDE, and curl,
which use separate certificate stores.
2) Solution or Work-Around
Please install the updated packages.
A work-around would be to disable SSL v2 support in the applications.
3) Special Instructions and Notes
Restart all services using SSL communication.
최근 배포된 SUSE Linux 10에도 포함되는 내용이기에 어지간한 다른 배포본도 해당사항이 있으리라 보여요...
확인은 안해봤지만요 ^^
SSH자체가 텔넷의 기본적인 보안문제를 해결한 것인데 참 거시기 하군요.