DROWn attack for SSL in EMS

DROWn attack for SSL in EMS

book

Article ID: KB0082403

calendar_today

Updated On:

Products Versions
TIBCO Enterprise Message Service -
Not Applicable -

Description

Description:
Cross-protocol attack on TLS using SSLv2 (DROWN)
Symptoms:

The DROWN attack: "The attack works against every known SSL/TLS implementation supporting SSLv2. " (excerpted from https://www.openssl.org/blog/blog/2016/03/01/an-openssl-users-guide-to-drown/)

 

We use TLSv1 with all versions of the EMS server that support SSL with all versions of the client that support SSL. This means that all versions EMS are secure. 
If you do a pen-test of the EMS server, you may find that the server does accept SSLv3 connections. However, this does not present a problem:
● Both the server and the client are coded to prefer TLSv1, so any connection between legitimate EMS participants will either succeed as TLSv1, or fail entirely.
● Unlike web browsers, the EMS client does not retry connections with successively older protocols. So the client cannot be tricked into using SSLv3 by interfering with connection attempts.

Starting from EMS 8.2.2, it relies on OpenSSL 1.0.1p, which by default offers only TLS 1.2

Issue/Introduction

DROWn attack for SSL in EMS

Environment

All version of EMS upto 8.2.2

Resolution

EMS 8.3 will ship with openssl 1.0.2f

Additional Information

www.openssl.org/blog/blog/2016/03/01/an-openssl-users-guide-to-drown/