Analytics
11/15/2012
03:01 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

GlobalSign SSL Configuration Checker Provides Guidance To Reduce Cybercriminals' Ability To Exploit Faulty SSL Configurations

Free online service allows website administrators to confirm that they have correctly configured SSL

BOSTON, MA – Nov. 15, 2012 - GlobalSign, one of the leading providers of SSL Certificates worldwide, today announced availability of its SSL Configuration Checker. This free online service allows website administrators to confirm that they have correctly configured SSL across their websites and receive actionable guidance on how to remediate any faulty or exploitable SSL configurations. Correctly configured SSL improves website performance and strengthens security, allowing organizations to preserve the end-user experience and provide better defense against SSL BEAST, CRIME, and other common and damaging attacks that exploit faulty SSL configurations.

Any organization can use the service by visiting sslcheck.globalsign.com. Once there, users simply enter the URL of the website they want to check. After a brief scan, the user receives a letter grade with a simplified explanation of any issues found in the website's SSL configuration and actionable remediation steps. The SSL Configuration Checker integrates the assessment technology of Qualys SSL Labs, which is focused on auditing the SSL ecosystem, raising awareness, and providing tools and documentation to web site owners so they can improve their SSL implementations. The tool is immediately available in Dutch, English, French, German, Japanese, Russian and Spanish to service the Internet at large.

"Research from Qualys SSL Labs shows that more than 70% of websites using SSL are configured incorrectly which has resulted in poor performance and weakened security. Unfortunately, until now there has been a lack of user-friendly resources to help administrators apply SSL securely," said Ryan Hurst, GlobalSign CTO. "With the availability of SSL Configuration Checker, GlobalSign is adding context to SSL issues by helping companies understand how best to configure SSL to reduce their risk and optimize performance. Our goal is to help all organizations reduce SSL-related risks."

"Configuring SSL properly is an important step in realizing the benefits of SSL. However, it's often hard for administrators to find comprehensive guidance on how to accomplish this goal," said Ivan Ristic, director of engineering at Qualys. "Our work with GlobalSign is addressing this need and making the Internet a safer place for everyone."

"Security doesn't end at the close of a technology sale. Providers need to deliver ongoing support for products and services that allow their customers to maximize the value of their solutions and increase their effectiveness as the threat landscape changes," said Richard Stiennon, noted security author, speaker and founder of IT-Harvest. "As a Certificate Authority, GlobalSign is in the best position to understand website administrators' needs in configuring SSL and remediation of security issues."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.