Lessons

Vulnerabilities of a secure SSL connection

SSL cipher is a combination of 5 technologies involved in establishing an encrypted connection. For example, the TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 cipher also consists of the following technologies:

  • TLS is a data transfer protocol. Can be equal to TLS1, TLS1.1, SSLv3, etc.
  • ECDHE is a temporary (ephemeral) key.
  • ECDSA is an authentication algorithm.
  • AES_128_GCM is a symmetric encryption algorithm.
  • SHA256 is a data hashing algorithm.
Despite the fact that some vulnerabilities have existed for more than 10 years still hundreds of sites are affected by them.
Despite the fact that some vulnerabilities have existed for more than 10 years still hundreds of sites are affected by them.

All these components should be safe both individually and in combination.

We check:

  • Vulnerability of the cipher suites available for use by your server. We check for the presence of obviously vulnerable cipher suites: NULL, aNULL, EXPORT, LOW, 3DES_IDEA, OBSOLETE, STRONG_NOFS.
  • Using the modern SSL connection protocol.
  • Support for advanced encryption standards.
  • 19 types of popular attacks using SSL such as: heartbleed, CCS, ticketbleed, ROBOT, secure renego, secure client renego, CRIME TLS, POODLE SSL, fallback SCSV, SWEET32, FREAK, DROWN, DROWN hint, LOGJAM, LOGJAM common primes, BEAST, LUCKY13, winshock. The possibility of these attacks is a serious security problem.

A critical or fatal vulnerability of an SSL connection is equal to the absence of encryption on the site at all, as it is easily breakable.

Tariff plans for working with the service

We use cookies. By continuing to use the site, you agree to the processing of personal data in accordance with privacy policy. I agree