Thursday, 29 January 2015

Junos : Multiple products affected by SSL "POODLE" vulnerability

he SSL protocol 3.0 (SSLv3) uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack.  This issue is also known as the "POODLE" vulnerability.

SSL v3 is an older security protocol with known issues, but still exists as a fallback protocol on many devices.

Vulnerable Products
  • Junos OS
  • Connect Secure (SA / SSL VPN) / Policy Secure (IC / UAC), MAG Series
  • ScreenOS
  • Junos Space
  • STRM/JSA Series
  • NSM (server and NSM4000, NSM3000, NSMXpress appliance)
  • Standalone IDP
  • Firefly Host (vGW Series)
  • SBR Carrier.

Products Not Vulnerable
  • JunosE
  • QFabric Director
  • Juniper owned web servers that provide feature support for ScreenOS and SRX (Deep Inspection (DI), AV, and licensing)

Juniper is continuing to investigate our product portfolio for affected software that is not mentioned above. As new information becomes available this document will be updated.

This issue has been assigned CVE-2014-3566.

Solution:
Junos:
OpenSSL has been upgraded to 0.9.8zc (pre-Junos OS 13.3) and 1.0.1j (Junos OS 13.3+), adding support for SSL 3.0 Fallback protection (TLS_FALLBACK_SCSV).

The following software releases have been updated to resolve this specific issue: Junos OS 11.4R13, 12.1X44-D45, 12.1X46-D26, 12.1X47-D20, 12.3R9, 12.3X48-D10, 13.2R7, ​13.3R5, 14.1R4, 14.1X53-D20, 14.2R2, and all subsequent releases.


Connect Secure (SA / SSL VPN) / Policy Secure (IC / UAC), MAG Series:
Please refer to Pulse Secure TSB16540 for details on mitigating risk from this vulnerability.

ScreenOS:
PR 1033963 has been submitted to Development and to resolve this issue in a future release.

Junos Space:
Disable SSLv3 by changing the following files.

/etc/httpd/conf.d/webProxy.conf
/etc/httpd/conf.d/ssl.conf
/etc/httpd/conf.d/webConf/webProxyCertAuth.conf
The following line needs to be updated to remove references to SSLv3:

Original:
SSLProtocol -ALL +SSLv3 +TLSv1

Updated:
SSLProtocol -ALL +TLSv1

Restart httpd by typing 'service httpd restart'.

A future release of Junos Space will disable SSLv3 by default.

STRM/JSA Series:
Enginering is developing a patch to resolve this issue.

NSM (server and NSM3000/NSMXpress appliance):
SSLv3 has been disabled in 2012.2R10 and all subsequent releases.

Standalone IDP:
Modify /etc/httpd/conf/httpd.conf to add -SSLv3 as below and then restart httpd ('service httpd restart').

Old: SSLProtocol all -SSLv2
New: SSLProtocol all -SSLv2 -SSLv3

Firefly Host (vGW Series):
Resolved in upcoming release 6.0R2 of Firefly Host by adding ssl.use-sslv3 = "disable" to configuration.



IDP Signature:

Juniper has released signature SSL:AUDIT:SSL-V3-TRAFFIC in Sigpack 2430 to detect SSLv3 traffic.


Workaround:
Junos:
Since SSL is used for remote network configuration and management applications such as J-Web and SSL Service for JUNOScript (XNM-SSL), viable workarounds for this issue in Junos may include:
  • Disabling J-Web
  • Disable SSL service for JUNOScript and only use Netconf, which makes use of SSH, to make configuration changes
  • Limit access to J-Web and XNM-SSL from only trusted networks

On SRX Series services gateways, Junos Pulse also fetches the configuration file via HTTPS.  To guard against downgrade/SSLv3 MITM attacks, an alternative workaround may be used to disable SSLv3 negotiation:

1. From the root shell:
root@junos% vi /jail/var/etc/httpd.conf

Change the default config of "SSLProtocol ALL -SSLV2" to "SSLProtocol TLSv1"

2. Find the process ID (pid) of httpd and kill/restart it:
root@junos% ps auxw | grep httpd
root@junos% kill -9 (pid of httpd)
OR kill -HUP (pid of httpd)

*Note: This change will not survive reboots.  Additionally, executing the 'restart web-management' CLI command will restart the httpd-gk process which will regenerate the default httpd.conf file, overwriting manual changes. Refer to KB18162 for more information about this workaround.


ScreenOS:
A temporary workaround for the server side of ScreenOS you can disable the HTTPS web user interface and the WebAuth feature. If you disable the HTTPS user interface you would be required to do configuration management over command line (SSH). The command to disable SSL is the following:  unset ssl enable

NSM4000, NSM3000, NSMXpress:

For Apache server listening on port 443:

Edit /etc/httpd/conf.d/ssl.conf and change the SSLProtocol entry to:
SSLProtocol all -SSLv2 -SSLv3

and restart HTTPD services.
For webproxy used to download the NSM client on port 8443:
Edit the /usr/netscreen/GuiSvr/lib/webproxy/conf/server.xml

from:
clientAuth="false" sslProtocol="SSL" keystoreFile="VAR-NSROOT-VAR/GuiSvr/lib/webproxy/conf/.webproxy_keystore"
to:
clientAuth="false" sslProtocols="TLSv1,TLSv1.1,TLSv1.2" keystoreFile="VAR-NSROOT-VAR/GuiSvr/lib/webproxy/conf/.webproxy_keystore"
and resart GuiSvr.


Client Side Mitigation:
The risk of attack from negotiating or being forced to downgrade to SSLv3 can be completely mitigated by disabling SSLv3 support in the browser.

1 comment:

  1. Thanks for sharing, nice post!

    Hiện nay trên thị trường có nhiều loại may dua vong và sau nhiều năm kinh doanh thiet bi dua vong tu dong, máy đưa võng em bé An Thái Sơn nhận thấy may dua vong ts – sản phẩm máy đưa võng thiết kế dành riêng cho em bé, có chất lượng rất tốt, hoạt động êm, tuyệt đối an toàn cho trẻ, và vong dua em be là lựa chọn hoàn hảo đảm bảo giấc ngủ ngon cho bé yêu của bạn.

    Chia sẻ bệnh viêm khớp không nên ăn gì, một số mẹo giúp giảm độ cận thị cho bạn, bí quyết chống nắng với cà chua cực hiệu quả hay những thực phẩm giúp tóc mọc nhanh hiệu quả, cách giúp bé ngủ ngon giấcthực phẩm giúp bé ngủ ngon mẹ nên biết, chia sẻ cách làm trắng da toàn thân bằng thực phẩm, những món ăn chữa bệnh mất ngủ giúp ngủ ngon, mách mẹ mẹo giúp bé không sốt khi mọc răng hay làm sao để trẻ không bị sốt khi mọc răng

    Những thực phẩm giúp đẹp da tại http://nhungthucphamgiupda.blogspot.com/
    Thực phẩm giúp bạn trẻ đẹp tại http://thucphamgiuptre.blogspot.com/
    Thực phẩm làm tăng tại http://thucphamlamtang.blogspot.com/
    Những thực phẩm giúp làm giảm tại http://thucphamlamgiam.blogspot.com/
    Những thực phẩm tốt cho tại http://thucphamtotcho.blogspot.com/
    Những thực phẩm tốt cho da tại http://thucphamtotchoda.blogspot.com/
    Chăm sóc da mặt ở http://chamsocdamato.blogspot.com/
    Cách chăm sóc da mặt bằng http://cachchamsocdamatbang.blogspot.com/
    Dạy trẻ sơ sinh tại http://daytresosinh.blogspot.com/
    Bí quyết giảm cân hay tại http://biquyetgiamcanhay.blogspot.com/

    ReplyDelete

loading...