Overall analysis of BEAST
Jumping quite late in the bandwagon, I have done our own security assessment of the most recent vulnerability in SSL called "BEAST" (Browser Exploit Against SSL/TLS). I have summarized my findings in the Koumbit wiki so that others can contribute. Basically, three steps should be taken:
- block javascript, java and flash from untrusted sites using NoScript and Flashblock in Firefox, or by turning off plugins, java and javascript in Chromium (a little button will appear to re-enable them as needed)
- update your browser when the fixes are released (in beta for Chromium, Firefox pretends they are not vulnerable, even though they committed a fix similar to chrome's)
- start migrating to TLS 1.2 and pressure vendors to do so
Comments on this page are closed.
Created .
Edited .