Attackers Can Hijack 95 Percent of All HTTPS Connections

Exterminator

Level 85
Thread author
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
48,602
8,380
USA
Because server admins fail to properly set up HTTP Strict Transport Security (HSTS), a large amount of today's HTTPS traffic can be hijacked via trivial attacks.

HSTS is Web security policy supported by most of today's Web browsers. HSTS helps webmasters protect their service and their users against HTTPS downgrades, man-in-the-middle attacks, and cookie hijacking for HTTPS connections.

One in twenty HTTPS connections is in danger
According to a recent Netcraft study, 95% of all of today's servers running HTTPS either fail to set up HSTS or come with configuration errors that open server-client connections to the above-listed attack scenarios.

What's more interesting is the fact that Netcraft has been running the same scan for the past three years, and proper HSTS usage has remained at the same levels.

This shows that webmasters aren't learning or being told that they've set up HSTS in an incorrect manner or that they just don't care.

The easiest attack scenario against these insecure sites is the HTTPS downgrade attack, during which attackers can choose multiple methods of forcing a seemingly secure HTTPS connection into using no encryption at all or a weaker certificate that can be attacked and broken later on.

According to security researchers, among those 95% sites that have failed to set up HSTS, you can find a lot of banks and websites that handle financial operations.

You can activate HSTS by adding one line in your server config
What's more mind-boggling is that implementing HSTS is done by adding one single line of code to a server's configuration.

Strict-Transport-Security: max-age=31536000;
This line makes the server tell browsers to access its content only via HTTPS connections, and it includes the maximum keep-alive value of one year.

When this setting is active, even if the user types in the "http://" prefix by hand in their URL bar, the browser will automatically change that to "https://" at the server's request.
 
  • Like
Reactions: Noxx and harlan4096
"Most of the effective defences against MITM can be found only on router or server-side. You won’t be having any dedicated control over the security of your transaction."

Source: The Windows Club

There is little a home user can do to protect against some network attacks; it is the server Admin that can only ensure stronger protection.
 
I hope this will be minimized through http/2 implementation. :)
 
Guys in charge of big data centers or servers should really recieve the necessary training to avoid this kind of stuff. They usually leave it very easy..