Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010

Oct 15, 2013 16:55

В общем, вот люди нашли еще одно (возможное) отверстие в криптолибах, на сей раз в Андроиде - просто так взяли и закоммитили другой список дефолтных параметров шифрования, на который есть известные атаки. Или неизвестные ;)

Open Source, да. Три года коммиту.

tl;dr

Android is using the combination of horribly broken RC4 and MD5 as the first default cipher on all SSL connections. This impacts all apps that did not care enough to change the list of enabled ciphers (i.e. almost all existing apps). This post investigates why RC4-MD5 is the default cipher, and why it replaced better ciphers which were in use prior to the Android 2.3 release in December 2010.

read more: http://op-co.de/blog/posts/android_ssl_downgrade/
10x @hedin

This entry was originally posted at http://wizzard.dreamwidth.org/316703.html. It has
comments. Please comment there using OpenID.

fail, android, паранойя, google, weird

Previous post Next post
Up