Recently we came across a vulnerability know as Logjam which according to researchers any attacker or Man in the middle can exploit weak Diffie–Hellman key Algorithm. this vulnerability has denoted with CVE number as CVE-2015-4000. How DH Algorithm gets exploited Traditionally, secure encrypted communication between two parties (here browser and servers) required that they first exchange keys by some secure physical channel. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. Here attacker can force the communication between the server and browser to downgrade to lower bit export grade cryptography. The attackers can attacks any servers that support DHE_EXPORT ciphers and affects mostly all browsers. Recommendation : 1) Disable Export Cipher Suites Even though modern browsers ...
Started this Blog to share my experience while working on various issues of linux servers and cloud technologies. Here in this blog you can find solutions to different errors we as system admin can face during our daily work. So stay tuned. Also you can go through my start-up to buy Hosting Products like SSL, Wordpress and VPS or Linux and Windows servers at affordable prices.