A newly released denial-of-service (DOS) tool can be used to bring down SSL (Secure Sockets Layer) servers using an average laptop computer and a standard DSL connection.
Called THC-SSL-DOS, Denial-of-service attacks typically involve sending a higher number of requests than servers can process at once. Usually, this requires attackers to at least match the bandwidth of their targets, which is why most DOS attacks are performed in a distributed manner from a large number of computers.
However, this is not the case with SSL exhaustion attacks because servers consume considerably more resources during SSL handshakes than clients. THC-SSL-DOS can trigger thousands of renegotiations via a single TCP connection, thus putting attackers at a clear advantage.
The Hackers Choice claims that running from a laptop with a standard DSL connection, its tool can challenge a server on a 30Gbps link. "The average server can do 300 handshakes per second. This would require 10 to 25 percent of your laptop's CPU," the group explains.
This type of attack is not new. In fact, vendors have known about the issue since 2003 and, according to the THC, the method was used in last year's DOS attacks against MasterCard.
The hacking outfit decided to release the tool now because it has already been leaked online a couple of months ago. "We are hoping that the fishy security in SSL does not go unnoticed. The industry should step in to fix the problem so that citizens are safe and secure again," a THC member said.
It's worth pointing out that even without SSL renegotiation enabled, attackers can still use THC-SSL-DOS successfully against servers. However, such attacks would require more than a single laptop.
"It still works if SSL renegotiation is not supported but requires some modifications and more bots before an effect can be seen," the group noted. "Taking on larger server farms who make use of SSL load balancers required 20 average size laptops and about 120kbit/sec of traffic," it added.
This is not the first time when SSL renegotiation exposed servers to security risks. Back in November 2009, a Turkish grad student devised a proof-of-concept man-in-the-middle attack that exploited a vulnerability in this SSL feature to steal Twitter login credentials passed over secure connections.
Find your next job with techworld jobs