On 6/14/19 5:00 AM, Bob Hood wrote:
1. By itself, is the implicit use of OpenSSL by the QSslSocket class on the
server side sufficient to secure data communications between both endpoints?

The short answer is no. Sadly, it is what you will find in most places.

Neither TLS nor SSL are secure nor can they ever be. They are architecturally flawed.  You can pull down software from The Dark Web which when run on a hokey little $80 2-in-1 sold by Walmart can, in 15 minutes or less, unpackage anything sent via SSL and caught via most forms of sniffing. In well under an hour using the same hokey laptop it can penetrate pretty much any SSL/TLS secured access point.

You can even get free OpenSource packages to "evaluate" your solution.

https://tools.kali.org/information-gathering/tlssled

The real question is what are you securing?

A chat engine? Who cares? People on those things routinely give out their mother's maiden name, name of their first pet and the closest relative living farthest from them. In the immortal words of Ron White "You can't fix stupid."

The level of security must go up with the level of value. The flip side of this is the openness of access must go down.

You cannot have anything called "secure" on the Internet accessible via a standard browser. This is why many banks and brokerage firms are moving to 2-stage connection verification and custom browser plug-ins.

2-stage is really (*^)(*&)ing annoying, but if you have an account enabled for wire transfer or any other Internet access which could pull money out, it really is the way to go. The 2-stage is you do your normal username/password/verification question on each login, then you prompt them to choose email or phone for an N-digit one time code. Once they enter it you drop a short life cookie (sometimes one connection, other times one day, never more than a week) which lets it work for a little while.

The 2-stage is the industry finally admitting SSL/TLS are architecturally flawed and can never be made secure.

Moving up in security you create a plug-in for popular browsers (Firefox/Chrome/Opera) on popular platforms (Linux/Android/forget about security on Windows). After a user has created an account with you they must be on a supported platform and install the browser plug-in to continue.

Honestly, you can make it a plug-in or you can make it a stand alone app. If all you are using is SSL/TLS it isn't secure, you just protected their password a touch better.

The plug-in/app works old school, like you are used to. Data is both shuffled and encrypted before transmission. If you are using only one encryption method with only one seed for the life of the connection, consider yourself hacked before they installed the app/plug-in.

You can use standard 3rd party encryption libraries, but what you cannot have are any two packets encrypted with both the same seed and encryption method. Yeah, they are going to sniff your packets. Yeah, there are all kinds of free tools on the Internet to peel that SSL right off there. After that, they have to start from ground zero with every packet. The biggest flaw in old school data transmissions was the single-method-single-key for entire file or comm session. Evil doers only had to crack one packet for the rest of them to be easy as knocking over dominoes. Some of the older encryption libraries even left tell-tale signatures in the encrypted packet so at a glance they could tell what method was used. Making it an exercise of just finding the proper seed. When you have a million PC bot-net at your disposal it generally takes more time to distribute the work than it does to get the answer.

Before anyone thinks "Oh, it's only email," think again. In order to gain access to much larger and more secure companies, hackers are targeting the emails of their mom & pop service providers.

https://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/

This is a reality which may cause some good intentioned laws, forcing major companies to assign a certain percentage of outside business to small/minority owned companies (mom & pop basically). These companies do not have the skills or the checkbooks to properly secure computers and their network. They are increasingly becoming a liability. At some point firms the size of Target and up will be financially ahead to just write a check to the small companies and get their services from a major firm which can secure everything.

Sad but true. The intention was "Hey, be a good corporate citizen. Give some of the small jobs like servicing your HVAC and plumbing to local small companies." It made sense and built good will. It was a small risk. They either could or couldn't do the job. You could manage for that. You can't manage for them being the entry point of a breach which costs north of $50 million to clean up.

Just my 0.002 cents.

--
Roland Hughes, President
Logikal Solutions
(630)-205-1593  (cell)
http://www.theminimumyouneedtoknow.com
http://www.infiniteexposure.net
http://www.johnsmith-book.com

_______________________________________________
Interest mailing list
Interest@qt-project.org
https://lists.qt-project.org/listinfo/interest

Reply via email to