• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM Blocks ‘Bar Mitzvah’ Attack In SSL/TLS

    April 27, 2015 Alex Woodie

    IBM recently issued a security bulletin for a newly discovered security vulnerability–a weak cryptography algorithm in the SSL/TLS protocol stack–that could allow hackers to steal data. That vulnerability was dubbed the “Bar Mitzvah Attack” by the security researcher who discovered it because it uses a 13-year-old weakness in the RC4 algorithm.

    The Bar Mitzvah flaw was first described by Itsik Mantin, director of security research with Imperva, at the Black Hat Asia security event held in Singapore last month. The attack stems from a weakness in the way that the RC4 stream cipher creates encryption keys, which could allow an attacker to recover plain text from the encrypted information.

    According to Mantin’s description, the Bar Mitzvah attack rides atop Invariance Weakness, “a 13-year-old vulnerability of RC4 that is based on huge classes of RC4 weak keys.” Mantin demonstrates how the vulnerability “can be used to mount several partial plaintext recovery attacks on SSL-protected data when RC4 is the cipher of choice, recovering part of secrets such as session cookies, passwords, and credit card numbers.”

    Despite the well-known problems with the RC4 cipher, it is still used to protect 30 percent of SSL traffic, Mantin says, “likely amounting to billions of TLS connections every day.” (TLS refers to a more advanced version of Secure Sockets Layer encryption, and is essentially a new name for SSL.) It’s not known if any hackers are actively exploiting the Bar Mitzvah attack that Mantin described, but it’s clear that it’s time to stop using RC4.

    That’s exactly what IBM recommends doing in its security bulletin on the matter. Instead of issuing a patch or a PTF that removes RC4 from the various SSL/TLS implementations on IBM i, IBM’s workaround recommends disabling RC4.

    IBM i administrators will want to follow IBM’s instructions carefully to ensure that all traces of the RC4 algorithm are removed from their system. There are no fewer than four SSL/TLS implementations in common IBM system libraries alone, including IBM i System SSL, OpenSSL in PASE, the default Java implementation called IBMJSSE, and another for Domino. Third-party products, such as terminal emulators or file transfer tools, may use System SSL or one of the other implementations, or they may use others, IBM says.

    Ripping out the RC4 ciphers and replacing them with more modern AES cipher suites won’t necessarily be easy, and some applications may stop working without them. In those cases, customers must make a determination whether it is worth using that application with the known security issue until they can replace the weak ciphers with strong ones, or replace the product altogether. There is no easy way to determine which applications use RC4–a trace active at the time the security connation is made is required, IBM says.

    The Bar Mitzvah attack doesn’t appear to be as devastating as last year’s Heartbleed vulnerability in OpenSSL or the POODLE attack that appeared a few months later (in fact there were dozens of new vulnerabilities in TLS/SSL stack discovered last year, Mantin says). But administrators should take immediate action to fix the problem anyway.

    IBM says that all supported versions of IBM i, from version 6.1 to 7.2, are potentially impacted by the gangly pubescent pupil. But in reality, any Power System, System i, iSeries, or AS/400 server put into service since 2001, and which uses SSL/TLS to secure communications over the Internet, is vulnerable to the Bar Mitzvah attack.

    RELATED STORIES

    IBM Patches BIND and OpenSSL Flaws in IBM i

    IBM And ISVs Fight POODLE Vulnerability In SSL 3.0

    Heartbleed Exposes The Vulnerability Of An IBM i Mentality

    IBM Patches Heartbleed Vulnerability in Power Systems Firmware

    Heartbleed Postmortem: Time to Rethink Open Source Security?

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Midrange Dynamics North America

    With MDRapid, you can drastically reduce application downtime from hours to minutes. Deploying database changes quickly, even for multi-million and multi-billion record files, MDRapid is easy to integrate into day-to-day operations, allowing change and innovation to be continuous while reducing major business risks.

    Learn more.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    WorksRight Software:  ZIP codes, area codes, Canadian postal codes, CASS certification, and more
    Storagepipe:  Offsite backup and disaster recovery for IBM i.
    Four Hundred Monitor Calendar:  Latest info on national conferences, local events, & Webinars

    Ruby And DSLs And Blocks Head Power Sales Honcho Fires Up The IBM i Base

    Leave a Reply Cancel reply

Volume 25, Number 23 -- April 27, 2015
THIS ISSUE SPONSORED BY:

ARCAD Software
New Generation Software
Linoma Software
Shield Advanced Solutions
Manta Technologies

Table of Contents

  • The Remaining Power8 Systems Loom
  • Fresche Legacy Advances App Dev Integration Plan
  • Power Systems Sales Return To Growth
  • IBM Blocks ‘Bar Mitzvah’ Attack In SSL/TLS
  • SystemObjects Gets The Word Out On Mobile Messaging

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle