On Sat, Oct 10, 2020 at 15:01 Antony Stone < antony.st...@apache.open.source.it> wrote: > On Saturday 10 October 2020 at 20:23:46, Tom Browder wrote: ...
> > > I've been looking at ways to speed up my web services using > > https://webpagetest.org for analysis. One thing I've been reading about is > > using mod_deflate to compress certain files but keep seeing the warnings > > Which warnings? Where? ... > > > about using compression with https due to certain known threats. > > What threats? ... > Can you point us at any document about what this "issue" is, so that we know > what "threat" you're concerned about? Well it started with the docs for 2.4 and mod_deflate. Therein is this, quote: =====> Compression and TLS Some web applications are vulnerable to an information disclosure attack when a TLS connection carries deflate compressed data. For more information, review the details of the "BREACH" family of attacks. <===== End quote. I searched for the doc reference "BREACH" + "attack" and got several hits such as: TLSv1.3 has a post-handshake problem And an excerpt from it, quote: =====> CRIME and TIME CRIME (Compression Ratio Info-leak Made Easy) is a cross-layer protocol attack that includes a compression side-channel attack against HTTPS. It leverages information leaked by TLS compression on messages sent from the client to the server. CRIME can recover targeted parts of the plaintext given a MiTM access. In March 2013 at the Black Hat (EU), Tal Be’ery presented an extension of CRIME named TIME. It debuted two new enhancements: it used CRIME for server-to-client messages and did not require a MiTM situation by exploiting TCP window sizes. The first of these two modifications gave rise to BREACH (see further down). THE FIX: CRIME is ineffective against TLS 1.3 because TLS 1.3 disables TLS-level compression. To verify if a server is vulnerable to CRIME on port 443: openssl s_client -connect domainname.com:443 In the output of this command, look for TLS compression; if enabled, the server is vulnerable to CRIME. <===== End quote. When I last serious upgrades to my servers last July one problem with using TLS 1.3 was that the Firefox browser couldn't use it as because of post-handshake problems. So I'm currently running TLSv1.2. Best, -Tom