Preventing POODLE Attacks on ecopy ShareScan

Similar documents
Findings for

Configuring TLS 1.2 in EventTracker v9.0

Version: $Revision: 1142 $

INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council

Cyber Security Advisory

SSL/TLS Server Test of grupoconsultorefe.com

Security Improvements on Cast Iron

View Upgrades. VMware Horizon EN

SSL/TLS Server Test of

White Paper: Addressing POODLE vulnerability and SHA2 support in Progress OpenEdge HF

White Paper: Addressing POODLE Security Vulnerability and SHA 2 Support in Progress OpenEdge in 10.2B08

SSL/TLS Security Assessment of e-vo.ru

View Upgrades. VMware Horizon 7 7.0

Oracle Hospitality Inventory Management Security Guide Release 9.1 E

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Horizon 7 Upgrades. Modified on 06 SEP 2018 VMware Horizon 7 7.6

TLS1.2 IS DEAD BE READY FOR TLS1.3

Configuring Cisco Unified MeetingPlace Web Conferencing Security Features

Xerox Product Security

McAfee epolicy Orchestrator Release Notes

DROWN - Breaking TLS using SSLv2

Security Enhancements in Informatica 9.6.x

Best Practices of IBM Notes Traveler Deployment. Date: 27 Aug 2015

MaaS360 Cloud Extender NIAP Protection Profile Setup and Operations Guide. Abstract Guide to set up the Cloud Extender to meet the NIAP specifications

RoomWizard II Firmware Release Notes

PrinterOn On-Premise Server Release Technical Support Notes

Systematic Fuzzing and Testing of TLS Libraries Juraj Somorovsky

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

INSE Lucky 13 attack - continued from previous lecture. Scribe Notes for Lecture 3 by Prof. Jeremy Clark (January 20th, 2014)

McAfee epolicy Orchestrator Release Notes

SIEBEL 15 RELEASE & UPGRADE SUMMARY

A Theoretical Analysis of Different Hacking Techniques in Wireless Networks

Xerox Audio Documents App

VMware Horizon JMP Server Installation and Setup Guide. 13 DEC 2018 VMware Horizon 7 7.7

Draft. Thierry ZOLLER Principal Security Consultant

Security in the Privileged Remote Access Appliance

Convio Data Sync Connector 3 Installation Guide

CaliberRDM. Installation Guide

PowerSchool Release Notes PowerSchool Student Information System

SSL to TLS Conversion Information Are You Ready?

But where'd that extra "s" come from, and what does it mean?

Pre-Installation Checklist v5.0

Oracle Hospitality Hotel Mobile OPERA Web Services Server Installation Guide Release 1.1 E May 2017

Service Pack ET90U Feature Document

CVE / "POODLE"

Bomgar Vault Server Installation Guide

32c3. December 28, Nick goto fail;

3. Optionally, if you want to use the new Web SSO feature, complete the steps in Adding Web Single Sign-On Functionality.

PrinterOn On-Premise Server Release Technical Support Notes

Platform Compatibility

Cloud connector. The system architecture of SCC to integrate with your LDAP is as follows:

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7

infoxpert Support Article

CPSC 467: Cryptography and Computer Security

Practical Attacks on Implementations

More Attacks on Cryptography 3/12/2010

SSL/TLS: Still Alive? Pascal Junod // HEIG-VD

Barracuda Firewall Release Notes 6.5.x

Modifications according to new functionalities of the NCP Secure Enterprise Server 10.0.

CIS 700/002 : Special Topics : OWASP ZED (ZAP)

How to Configure SSL Interception in the Firewall

Defeating All Man-in-the-Middle Attacks

VMware vrealize Operations for Horizon Security. VMware vrealize Operations for Horizon 6.5

Summary on Crypto Primitives and Protocols

How to Configure SSL Interception in the Firewall

ecopy ShareScan v5.2 & & Folder Watching Service Module Overview and FAQs

Secure Internet Communication

Novell Filr 1.2 Administration Guide. November 2015

Recommendations for Device Provisioning Security

Live Data Connection to SAP Universes

Migration from VACMAN Middleware 3.0 AD to IDENTIKEY Authentication Server 3.3 AD.

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide

Configuring Secure Socket Layer HTTP

Diagnostic Manager Advanced Installation Guide

SonicOS Enhanced Release Notes

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

VMware Horizon JMP Server Installation and Setup Guide. Modified on 19 JUN 2018 VMware Horizon 7 7.5

Lecture 3: Symmetric Key Encryption

Platform Compatibility... 1 Enhancements... 2 Known Issues... 3 Upgrading SonicOS Enhanced Image Procedures... 3 Related Technical Documentation...

Oracle Hospitality RES 3700 Security Guide Release 5.5 E May 2016

Exinda How To Guide: SSL Acceleration. Exinda ExOS Version Exinda Networks, Inc.

Equitrac Integrated for Konica Minolta

Manage Certificates. Certificates Overview

Release Notes. Dell SonicWALL SRA Release Notes

Barracuda Firewall Release Notes 6.6.X

Server Installation Guide

Configuring Secure Socket Layer HTTP

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

Scan Report Executive Summary

Advanced Web Scanner Service

ecopy Quick Connect Administrator s Guide Version 4.5 for ShareScan Part Number: (1/2009)

Internet of things (IoT)

Course 834 EC-Council Certified Secure Programmer Java (ECSP)

Information Security Guideline OPERATING SYSTEM PATCHING

Getting to a command prompt

Crystal Enterprise. Overview. Contents. Web Server Overview - Internet Information System (IIS)

Uniform Resource Locators (URL)

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode

Symmetric Key Encryption. Symmetric Key Encryption. Advanced Encryption Standard ( AES ) DES DES DES 08/01/2015. DES and 3-DES.

Secure Web Appliance. SSL Intercept

Transcription:

Preventing POODLE Attacks on ecopy ShareScan Topics Overview What Products are Affected? Steps to Protect Against POODLE Attacks Disabling SSL in Window s Registry Disabling SSL in Apache Tomcat 1

Overview POODLE (Padding Oracle On Downgraded Legacy Encryption) is an attack against a design flaw in the SSL 3.0 protocol which allows attackers to decode the encrypted data of a secure SSL 3.0 connection. Refer to http://googleonlinesecurity.blogspot.ca/2014/10/this-poodle-bitesexploiting-ssl-30.html and https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566 for detailed descriptions. The POODLE allows for a man-in-the-middle attack to intercept communication between two systems using SSL 3.0 (e.g. client and server). The man-in-the-middle attack is used to manipulate the part of the encrypted data that the attack is trying to decode. It also causes connection errors forcing a protocol downgrade to SSL 3.0. The attack does not allow the intruders to decode entire conversations with a single connection; it takes 256 SSL 3.0 requests to reveal one byte of encrypted information. 2

What Products are Affected? Any systems and applications utilizing SSL 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable to POODLE attacks. The best way to protect against POODLE attacks is to completely disable server side SSL support that is, breaking the exposed communication link. This may impact connectivity or interoperability between clients and servers. For ecopy ShareScan, SSL must be disabled in the following areas: In the Windows registry for the Servers running ecopy ShareScan Manager (see Disabling SSL in Windows Registry) By configuring ecopy ShareScan Web server (see Disabling SSL in Apache Tomcat) Optionally, on networked MFPs configured for use with ecopy ShareScan. Customers should contact their MFP manufacturers/representatives to determine if updated firmware is available to disable SSL 3.0 from the networked devices, and to determine if any devices within their environment support TLS 1.x. Additionally, MFP vendor representatives should provide a list of devices that are vulnerable to the POODLE attack, and provide any available patches. On all servers where ecopy ShareScan acts as a client. For example: o Microsoft SQL server o Microsoft Active Directory server o LDAP servers o Exchange, SharePoint, and other 3 rd party systems with a connection to ShareScan. Please refer to the solution providers / software manufacturers recommendations for the actual steps. 3

Steps to Protect Against POODLE Attacks Disabling SSL in Windows Registry Manually In order to disable SSL support, the Windows registry must be edited. Windows Server 2008 supports SSL 2.0, SSL 3.0 and TLS 1.0 protocols, and Windows Server 2008 R2 and Windows 7 support SSL 2.0, SSL 3.0, TLS 1.0, TLS 1.1 and TLS 1.2. Although SSL 2.0 is the only security protocol displayed by default in the registry, SSL 3.0, TLS 1.0, TLS 1.1 and TLS 1.2 are all enabled by default even though the entries are not present in the registry. Refer to the following Microsoft Knowledge Base article for more details (http://support2.microsoft.com/default.aspx?scid=kb;en-us;245030#top) To manually edit the Windows registry for disabling SSL, do the following: 1. Select Start > Run. 2. Type regedit and click OK to open the Registry Editor. 3. In the Registry Editor, navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\ Protocol 4. Under Protocols, add the SSL 3.0 key. 5. Within the SSL 3.0 key, add Client and Server keys. 6. In both of the Client and Server keys, create the following DWORD values: DisabledByDefault with a value of 1. Enabled with a value of 0. 4 7. Open the SSL 2.0 key, and set the Enabled value to 0 in both the Client and Server keys. 8. Reboot the server. 9. After reboot, test all applications on the Client and Server for compatibility before rolling out the change. After disabling SSL 2.0 and SSL 3.0, it is recommended to ensure that at least one of the TLS protocols is enabled. Although the TLS protocols are enabled by default, they do not appear in the registry. To verify that the TLS protocol is enabled, do the following:

1. Create keys for one or all of the TLS 1.0, TLS 1.1 and TLS 1.2 protocols. 2. Within each of the protocol keys, add Client and Server keys. 3. Within each of the Client and Server keys, create the following DWORD values: DisabledByDefault with a value of 0. Enabled with a value of 1. 4. Reboot the server if required. Disabling SSL in Windows Registry an Alternative Method As an alternative to manual registry editing (as outlined above) you can use a software tool such as IISCrypto to quickly make the necessary changes. To use IISCrypto for editing the Windows registry, do the following: 1. Go to https://www.nartac.com/products/iiscrypto/ and download the appropriate version: one with a visual interface (GUI version) or a command line version. This document gives guidance on the use of the visual tool. 2. Run the downloaded executable. The main program window is displayed. 5 3. Select the Protocols you want to enable on the client and server, and deselect the protocols you want to disable. 4. Alternately, click Best Practices to allow the program to select the most appropriate protocols and ciphers for your system.

5. Click Apply. 6. Reboot your computer for the changes to take effect. IIS Crypto does not reboot your computer. 7. After reboot, ensure that SSL is disabled in the registry. Disabling SSL in Apache Tomcat After the above registry modifications, you can choose to disable SSL for the ecopy ShareScan Web client components as well by applying the following changes to the Tomcat configuration: 1. Stop the ecopy ShareScan Manager and the Tomcat service 2. Open the server.xml file for editing. By default, this is located under Program Files (x86)\nuance\tomcat 7.0\conf. 3. Locate section <Connector port="443" 4. Modify sslenabledprotocols to match the following: sslenabledprotocols="tlsv1, TLSv1.1, TLSv1.2, SSLv2Hello" 5. Save the server.xml file 6. Restart the Tomcat service and the ecopy ShareScan Manager. To prevent POODLE attacks, SSL only needs to be disabled either on the client or on the server. As long as either the client or the server does not support SSL, the communication link is broken, and the attack cannot happen. By applying the Tomcat configuration change, MFP s that are configured for HTTPS communications are protected from POODLE when interacting with ecopy ShareScan. 6 When disabling SSL in Tomcat, the managed devices must support TLS 1.x in order for the ecopy ShareScan Web client component to manage/update the device, and to maintain secure communication.