<ruby id="bdb3f"></ruby>

    <p id="bdb3f"><cite id="bdb3f"></cite></p>

      <p id="bdb3f"><cite id="bdb3f"><th id="bdb3f"></th></cite></p><p id="bdb3f"></p>
        <p id="bdb3f"><cite id="bdb3f"></cite></p>

          <pre id="bdb3f"></pre>
          <pre id="bdb3f"><del id="bdb3f"><thead id="bdb3f"></thead></del></pre>

          <ruby id="bdb3f"><mark id="bdb3f"></mark></ruby><ruby id="bdb3f"></ruby>
          <pre id="bdb3f"><pre id="bdb3f"><mark id="bdb3f"></mark></pre></pre><output id="bdb3f"></output><p id="bdb3f"></p><p id="bdb3f"></p>

          <pre id="bdb3f"><del id="bdb3f"><progress id="bdb3f"></progress></del></pre>

                <ruby id="bdb3f"></ruby>

                企業??AI智能體構建引擎,智能編排和調試,一鍵部署,支持知識庫和私有化部署方案 廣告
                # How we manage the TLS protocol CRIME vulnerability > 原文:[https://docs.gitlab.com/ee/security/crime_vulnerability.html](https://docs.gitlab.com/ee/security/crime_vulnerability.html) * [Description](#description) * [Nessus](#nessus) * [References](#references) # How we manage the TLS protocol CRIME vulnerability[](#how-we-manage-the-tls-protocol-crime-vulnerability "Permalink") [CRIME](https://en.wikipedia.org/w/index.php?title=CRIME&oldid=692423806)是利用 HTTPS 和 SPDY 協議(也使用數據壓縮)通過連接對秘密 Web Cookie 進行安全性攻擊的方法. 當用于恢復秘密身份驗證 Cookie 的內容時,它允許攻擊者在經過身份驗證的 Web 會話上執行會話劫持,從而允許發起進一步的攻擊. ## Description[](#description "Permalink") TLS 協議 CRIME 漏洞影響使用 HTTPS 進行數據壓縮的系統. 如果使用 SSL 壓縮(例如 Gzip)或 SPDY(可以選擇使用壓縮),則系統可能容易受到 CRIME 漏洞的攻擊. GitLab 支持 Gzip 和[SPDY,](http://nginx0org.icopy.site/en/docs/http/ngx_http_spdy_module.html)并通過在啟用 HTTPS 時禁用 Gzip 來緩解 CRIME 漏洞. 文件的來源在這里: * [Source installation NGINX file](https://gitlab.com/gitlab-org/gitlab/blob/master/lib/support/nginx/gitlab-ssl) * [Omnibus installation NGINX file](https://gitlab.com/gitlab-org/omnibus-gitlab/blob/master/files/gitlab-cookbooks/gitlab/templates/default/nginx-gitlab-http.conf.erb) 盡管在 Omnibus 安裝中啟用了 SPDY,但 CRIME 依賴于壓縮(" C"),NGINX 的 SPDY 模塊中的默認壓縮級別為 0(無壓縮). ## Nessus[](#nessus "Permalink") Nessus 掃描儀[報告](https://www.tenable.com/plugins/index.php?view=single&id=62565) GitLab 中[可能存在的 CRIME 漏洞](https://www.tenable.com/plugins/index.php?view=single&id=62565) ,類似于以下格式: ``` Description This remote service has one of two configurations that are known to be required for the CRIME attack: SSL/TLS compression is enabled. TLS advertises the SPDY protocol earlier than version 4. ... Output The following configuration indicates that the remote service may be vulnerable to the CRIME attack: SPDY support earlier than version 4 is advertised. ``` 從上面的報告中,需要特別注意的是,Nessus 僅檢查 TLS 是否在版本 4 之前發布了 SPDY 協議.它不執行攻擊,也不檢查是否啟用了壓縮. 僅 Nessus 掃描程序無法告知 SPDY 的壓縮已禁用并且不受 CRIME 漏洞的影響. ## References[](#references "Permalink") * NGINX [“Module ngx_http_spdy_module”](http://nginx0org.icopy.site/en/docs/http/ngx_http_spdy_module.html) * Tenable Network Security,Inc. ["傳輸層安全性(TLS)協議 CRIME 漏洞"](https://www.tenable.com/plugins/index.php?view=single&id=62565) * Wikipedia 的貢獻者, [" CRIME"](https://en.wikipedia.org/wiki/CRIME) Wikipedia,免費的百科全書
                  <ruby id="bdb3f"></ruby>

                  <p id="bdb3f"><cite id="bdb3f"></cite></p>

                    <p id="bdb3f"><cite id="bdb3f"><th id="bdb3f"></th></cite></p><p id="bdb3f"></p>
                      <p id="bdb3f"><cite id="bdb3f"></cite></p>

                        <pre id="bdb3f"></pre>
                        <pre id="bdb3f"><del id="bdb3f"><thead id="bdb3f"></thead></del></pre>

                        <ruby id="bdb3f"><mark id="bdb3f"></mark></ruby><ruby id="bdb3f"></ruby>
                        <pre id="bdb3f"><pre id="bdb3f"><mark id="bdb3f"></mark></pre></pre><output id="bdb3f"></output><p id="bdb3f"></p><p id="bdb3f"></p>

                        <pre id="bdb3f"><del id="bdb3f"><progress id="bdb3f"></progress></del></pre>

                              <ruby id="bdb3f"></ruby>

                              哎呀哎呀视频在线观看