<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Ssl – Yeri Tiete</title>
    <link>https://yeri.be/tag/ssl/</link>
    <description>Yeri Tiete&#39;s blog</description>
    <language>en</language>
    <copyright>© Yeri Tiete</copyright>
    <lastBuildDate>Sun, 12 Jun 2016 13:35:10 +0200</lastBuildDate>
    <atom:link href="https://yeri.be/tag/ssl/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Postfix &amp; Courier &amp; Letsencrypt</title>
      <link>https://yeri.be/postfix-courier-letsencrypt/</link>
      <pubDate>Sun, 12 Jun 2016 13:35:10 +0200</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/postfix-courier-letsencrypt/</guid>
      <description>&lt;p&gt;First of all, &lt;a href=&#34;https://letsencrypt.org/getting-started/&#34; target=&#34;_blank&#34;&gt;create&lt;/a&gt; your certificates (the regular way). I created one with multiple domains: webmail.rootspirit.com, mail.rootspirit.com, smtp.rootspirit.com.&lt;/p&gt;&#xA;&lt;p&gt;In &lt;a href=&#34;http://rootspirit.com/&#34; target=&#34;_blank&#34;&gt;my case&lt;/a&gt;, as the mailserver and webserver are behind a proxy (postfix, imap, Roundcube Webmail), I create the certificate on the proxy (nginx) and scp the cert to the mail server. All this is automated with a tiny script.&lt;/p&gt;&#xA;&lt;p&gt;For Postfix, edit &lt;code&gt;main.cf&lt;/code&gt; and change/edit/add these lines (check the right path too!):&lt;/p&gt;&#xA;&lt;pre&gt;smtpd_use_tls = yes&#xA;smtpd_tls_key_file = /etc/ssl/letsencrypt/webmail.privkey.pem&#xA;smtpd_tls_cert_file = /etc/ssl/letsencrypt/webmail.fullchain.pem&#xA;smtpd_tls_received_header = yes&#xA;smtpd_tls_session_cache_timeout = 3600s&#xA;tls_random_exchange_name = /var/run/prng_exch&#xA;tls_random_source = dev:/dev/urandom&#xA;smtpd_tls_exclude_ciphers = aNULL, eNULL, EXPORT, DES, RC4, MD5, PSK, aECDH, EDH-DSS-DES-CBC3-SHA, EDH-RSA-DES-CDB3-SHA, KRB5-DES, CBC3-SHA&#xA;smtpd_tls_dh1024_param_file = /etc/ssl/postfix/dhparams.pem&#xA;smtpd_tls_auth_only = yes&#xA;smtp_tls_security_level = may&#xA;smtpd_use_tls=yes&#xA;smtpd_tls_security_level=may&#xA;smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache&#xA;smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache&#xA;smtpd_tls_loglevel=1&#xA;smtp_tls_loglevel=1&lt;/pre&gt;&#xA;&lt;p&gt;And restart postfix: &lt;code&gt;/etc/init.d/postfix restart&lt;/code&gt;&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>First of all, <a href="https://letsencrypt.org/getting-started/" target="_blank">create</a> your certificates (the regular way). I created one with multiple domains: webmail.rootspirit.com, mail.rootspirit.com, smtp.rootspirit.com.</p>
<p>In <a href="http://rootspirit.com/" target="_blank">my case</a>, as the mailserver and webserver are behind a proxy (postfix, imap, Roundcube Webmail), I create the certificate on the proxy (nginx) and scp the cert to the mail server. All this is automated with a tiny script.</p>
<p>For Postfix, edit <code>main.cf</code> and change/edit/add these lines (check the right path too!):</p>
<pre>smtpd_use_tls = yes
smtpd_tls_key_file = /etc/ssl/letsencrypt/webmail.privkey.pem
smtpd_tls_cert_file = /etc/ssl/letsencrypt/webmail.fullchain.pem
smtpd_tls_received_header = yes
smtpd_tls_session_cache_timeout = 3600s
tls_random_exchange_name = /var/run/prng_exch
tls_random_source = dev:/dev/urandom
smtpd_tls_exclude_ciphers = aNULL, eNULL, EXPORT, DES, RC4, MD5, PSK, aECDH, EDH-DSS-DES-CBC3-SHA, EDH-RSA-DES-CDB3-SHA, KRB5-DES, CBC3-SHA
smtpd_tls_dh1024_param_file = /etc/ssl/postfix/dhparams.pem
smtpd_tls_auth_only = yes
smtp_tls_security_level = may
smtpd_use_tls=yes
smtpd_tls_security_level=may
smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
smtpd_tls_loglevel=1
smtp_tls_loglevel=1</pre>
<p>And restart postfix: <code>/etc/init.d/postfix restart</code></p>
<p>As for Courier you&rsquo;ll need to concatenate the files (again, check the path, it&rsquo;s most likely <code>/etc/letsencrypt/live/domain/xyz.pem</code>):</p>
<p><code>cat /etc/ssl/letsencrypt/webmail.privkey.pem /etc/ssl/letsencrypt/webmail.fullchain.pem &gt; /etc/ssl/letsencrypt/webmail.all.pem</code></p>
<p>Then edit both <code>/etc/courier/pop3d-ssl</code> and <code>/etc/courier/imapd-ssl</code></p>
<p>And add/change the path of the certificate:</p>
<p><code>TLS_CERTFILE=/etc/ssl/letsencrypt/webmail.all.pem</code></p>
<p>And restart Courier: <code>/etc/init.d/courier-imap-ssl restart &amp;&amp; /etc/init.d/courier-pop-ssl restart</code></p>
]]></content:encoded>
      <category>linux</category><category>networking</category><category>software</category><category>www</category>
      <category>encryption</category><category>mail</category><category>rootspirit</category><category>ssl</category>
    </item>
    
    <item>
      <title>Gmail &amp; Postfix: unencrypted emails?</title>
      <link>https://yeri.be/gmail-unencrypted-emails/</link>
      <pubDate>Mon, 07 Mar 2016 19:14:52 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/gmail-unencrypted-emails/</guid>
      <description>&lt;p style=&#34;text-align: left;&#34;&gt;&lt;a href=&#34;https://static.yeri.be/2016/03/gmail-unencrypted-tls.png&#34; rel=&#34;attachment wp-att-7458&#34;&gt;&lt;img class=&#34;alignnone wp-image-7458 size-full&#34; src=&#34;https://static.yeri.be/2016/03/gmail-unencrypted-tls.png&#34; alt=&#34;gmail-unencrypted-tls&#34; width=&#34;762&#34; height=&#34;222&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p style=&#34;text-align: left;&#34;&gt;If you&#39;re running Postfix, add this line to &lt;code&gt;main.cf&lt;/code&gt;:&lt;/p&gt;&#xA;&lt;code&gt;smtp_tls_security_level = may&lt;/code&gt;&#xA;&lt;p style=&#34;text-align: left;&#34;&gt;Restart Postfix, and retry.&lt;/p&gt;&#xA;&lt;p style=&#34;text-align: left;&#34;&gt;&lt;a href=&#34;https://static.yeri.be/2016/03/gmail-encrypted-tls.png&#34; rel=&#34;attachment wp-att-7464&#34;&gt;&lt;img class=&#34;alignnone size-full wp-image-7464&#34; src=&#34;https://static.yeri.be/2016/03/gmail-encrypted-tls.png&#34; alt=&#34;gmail-encrypted-tls&#34; width=&#34;850&#34; height=&#34;370&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p style=&#34;text-align: left;&#34;&gt;PS: You can set &lt;code&gt;encrypt&lt;/code&gt; instead of &lt;code&gt;may&lt;/code&gt; -- but this can cause issues with Amavis and/or SpamAssassin.&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p style="text-align: left;"><a href="https://static.yeri.be/2016/03/gmail-unencrypted-tls.png" rel="attachment wp-att-7458"><img class="alignnone wp-image-7458 size-full" src="https://static.yeri.be/2016/03/gmail-unencrypted-tls.png" alt="gmail-unencrypted-tls" width="762" height="222" /></a></p>
<p style="text-align: left;">If you're running Postfix, add this line to <code>main.cf</code>:</p>
<code>smtp_tls_security_level = may</code>
<p style="text-align: left;">Restart Postfix, and retry.</p>
<p style="text-align: left;"><a href="https://static.yeri.be/2016/03/gmail-encrypted-tls.png" rel="attachment wp-att-7464"><img class="alignnone size-full wp-image-7464" src="https://static.yeri.be/2016/03/gmail-encrypted-tls.png" alt="gmail-encrypted-tls" width="850" height="370" /></a></p>
<p style="text-align: left;">PS: You can set <code>encrypt</code> instead of <code>may</code> -- but this can cause issues with Amavis and/or SpamAssassin.</p>
]]></content:encoded>
      <category>linux</category><category>networking</category><category>software</category><category>www</category>
      <category>rootspirit</category><category>ssl</category>
    </item>
    
    <item>
      <title>Belgian banks &amp; SSL — part 5</title>
      <link>https://yeri.be/belgian-banks-ssl-part-5/</link>
      <pubDate>Fri, 18 Dec 2015 11:35:57 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/belgian-banks-ssl-part-5/</guid>
      <description>&lt;p&gt;Minor &lt;a href=&#34;https://yeri.be/belgian-banks-ssl-part-4&#34;&gt;end of year update&lt;/a&gt;. No big SSL exploits have been released since (bar DH, see below).&lt;/p&gt;&#xA;&lt;p&gt;Once again, this is testing the public websites I can access. There might be other gateways, APIs, etc that are not (as) secure.&lt;/p&gt;&#xA;&lt;p&gt;It&amp;rsquo;s worthy to note that some banks are serious about security and fixing their SSL. Most improved their rating and solved all issues (especially getting rid of SHA1 in the chain). However, a couple lowered from B to C (see below). But&amp;hellip; No more F&amp;rsquo;s. :)&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>Minor <a href="https://yeri.be/belgian-banks-ssl-part-4">end of year update</a>. No big SSL exploits have been released since (bar DH, see below).</p>
<p>Once again, this is testing the public websites I can access. There might be other gateways, APIs, etc that are not (as) secure.</p>
<p>It&rsquo;s worthy to note that some banks are serious about security and fixing their SSL. Most improved their rating and solved all issues (especially getting rid of SHA1 in the chain). However, a couple lowered from B to C (see below). But&hellip; No more F&rsquo;s. :)</p>
<p>The noteworthy changers:</p>
<ul>
	<li>Hello Bank! went from A to B though due to weak DH,</li>
	<li>Triodos lost their Forward Secrecy,</li>
	<li>Optima from F to A(-) (and a bunch others from B to A, and higher),</li>
	<li>A bunch from B to C due to SSLLabs being more severe (see below). Most did solve some of their issues,</li>
	<li>BKCP is doing a lot wrong.</li>
</ul>
Edit: Tested wrong AXA domain; updated to A+.
<p><em>Update 11 Jan 2016</em>: ABK &amp; BvB updated to A.</p>
<p>Note that not supporting TLS 1.2 or supporting RC4 capped sites to grade B about a year ago; it now caps to grade C (aka SSLLabs is more severe).</p>
<p><span style="color: #008000;">Grade A</span></p>
<ul>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure1.rabobank.be" target="_blank">Rabobank</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.evi.be" target="_blank">Evi</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=crelan-online.be" target="_blank">Crelan</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=login.binck.be&amp;hideResults=on" target="_blank">Binck</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.ing.be&amp;s=193.58.129.66&amp;hideResults=on" target="_blank">ING</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.keytradebank.be&amp;s=93.191.218.12" target="_blank">Keytrade Bank</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=cph.be" target="_blank">CPH</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=ebanking.nibcdirect.be" target="_blank">NIBC Direct</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=home.axabank.be&amp;latest" target="_blank">AXA</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.deltalloydbank.be" target="_blank">Delta Lloyd Bank</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.deutschebank.be" target="_blank">Deutsche Bank</a> (<span style="color: #339966;">A</span>): weak signature (SHA1).</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=elogin.medirectbank.be" target="_blank">MeDirect Bank</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.montepaschi.be" target="_blank">Monte Paschi</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.belfius.be&amp;s=212.63.233.37" target="_blank">Belfius</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.bnpparibasfortis.be&amp;s=193.58.4.82" target="_blank">BNP Paribas Fortis</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.bpostbank.be" target="_blank">bpost bank</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=internetbanking.argenta.be" target="_blank">Argenta</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=fortuneo.be&amp;s=93.20.42.107" target="_blank">Fortuneo</a> (<span style="color: #339966;">A</span>): invalid HSTS policy.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=fintro.be" target="_blank">Fintro</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=netbanking.dhbbank.com" target="_blank">DHB Bank</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=online.vdk.be" target="_blank">VDK</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=abkonline.abk.be" target="_blank">ABK</a>: (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.bankvanbreda.be&amp;latest" target="_blank">Bank Van Breda</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.ogone.com" target="_blank">Ogone</a> (<em>payment facilitator</em> -- <span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=moneyou.be" target="_blank">Moneyou</a> (<span style="color: #339966;">A-</span>): no Forward Secrecy.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=homebank.recordbank.be" target="_blank">Record Bank</a> (<span style="color: #339966;">A-</span>): no Forward Secrecy.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=banking.triodos.be&amp;latest" target="_blank">Triodos</a> (<span style="color: #339966;">A-</span>): no Forward Secrecy.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=optimaonline.optimabank.be" target="_blank">Optima Bank</a> (<span style="color: #339966;">A-</span>): no Forward Secrecy.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.kbc.be">KBC</a> (<span style="color: #339966;">A-</span>): no Forward Secrecy.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=isabel.eu" target="_blank">Isabel</a> (<em>banking tool for corps</em> -- <span style="color: #339966;">A-</span>): no Forward Secrecy.</li>
</ul>
<span style="color: #ff6600;">Grade B</span>
<ul>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.hellobank.be" target="_blank">Hello bank!</a>: Weak Diffie-Hell (aka DH) (<a href="https://weakdh.org/" target="_blank">info</a>).</li>
</ul>
<span style="color: #ff0000;">Grade C</span>
<ul>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.psabank.be&amp;s=93.20.46.143&amp;hideResults=on" target="_blank">PSA Bank</a>: weak signature (SHA1), no TLS 1.2, no Forward Secrecy.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=beobank.be" target="_blank">beobank</a>: weak DH, no TLS 1.2, RC4 (insecure), no Forward Secrecy, no secure renegotiation.</li>
	<li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=ident.bkcp.be&amp;hideResults=on&amp;latest" target="_blank">BKCP</a>: weak signature (SHA1), no TLS 1.2, RC4 (insecure), no Forward Secrecy, weak DH.</li>
</ul>
<span style="color: #ff0000;">Grade D</span>
<ul>
	<li>n/a</li>
</ul>
<span style="color: #ff0000;">Grade E</span>
<ul>
	<li>n/a</li>
</ul>
<span style="color: #ff0000;">Grade F</span>
<ul>
	<li>n/a</li>
</ul>
]]></content:encoded>
      <category>linux</category><category>networking</category><category>software</category><category>www</category>
      <category>belgium</category><category>ssl</category>
    </item>
    
    <item>
      <title>Belgian bank &amp; SSL slashdot effect</title>
      <link>https://yeri.be/belgian-bank-ssl-slashdot-effect/</link>
      <pubDate>Sat, 28 Feb 2015 10:11:01 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/belgian-bank-ssl-slashdot-effect/</guid><enclosure url="https://static.yeri.be/2015/02/slashdot.jpg" length="0" type="image/jpeg" />
      <description>&lt;p&gt;Quick wrap up of the &lt;a href=&#34;https://en.wikipedia.org/wiki/Slashdot_effect&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;slashdot effect&lt;/a&gt; 10 days ago.&lt;/p&gt;&#xA;&lt;p&gt;A peak of 12k views on Monday 16/02, with a small&amp;nbsp;buildup on Sunday (15/02).&lt;/p&gt;&#xA;&lt;figure class=&#34;wp-block-image&#34;&gt;&lt;a href=&#34;https://static.yeri.be/2015/02/slashdot.png&#34;&gt;&lt;img src=&#34;https://static.yeri.be/2015/02/slashdot-1024x306.png&#34; alt=&#34;slashdot&#34; class=&#34;wp-image-7007&#34;/&gt;&lt;/a&gt;&lt;/figure&gt;&#xA;&lt;p class=&#34;has-text-align-center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;The top pages were &lt;a href=&#34;https://yeri.be/belgian-banks-ssl-part-3&#34;&gt;Part 3&lt;/a&gt;, &lt;a href=&#34;https://yeri.be/belgian-banks-ssl&#34;&gt;Part 1&lt;/a&gt;, &lt;a href=&#34;https://yeri.be/belgian-banks-ssl-part-4&#34;&gt;Part 4&lt;/a&gt; and &lt;a href=&#34;https://yeri.be/belgian-banks-ssl-part-2&#34;&gt;Part 2&lt;/a&gt; respectively.&lt;/p&gt;&#xA;&lt;p&gt;De Redactie is the highest referrer, surpassing &lt;a href=&#34;https://twitter.com/demorgen/status/567268960047874048&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;De Morgen&lt;/a&gt; (first to publish in printed media, front page) &amp;amp; &lt;a href=&#34;http://datanews.knack.be/ict/ssl-beveiliging-van-de-belgische-banken-zo-lek-als-een-zeef/article-normal-533611.html&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Datanews&lt;/a&gt;&amp;nbsp;(first to publish online):&lt;/p&gt;&#xA;&lt;figure class=&#34;wp-block-image&#34;&gt;&lt;a href=&#34;https://static.yeri.be/2015/02/referrer.png&#34;&gt;&lt;img src=&#34;https://static.yeri.be/2015/02/referrer-1024x367.png&#34; alt=&#34;referrer&#34; class=&#34;wp-image-7008&#34;/&gt;&lt;/a&gt;&lt;/figure&gt;&#xA;&lt;p class=&#34;has-text-align-center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Second highest, after Twitter (&lt;a href=&#34;https://t.co/&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;t.co&lt;/a&gt;), was &lt;a href=&#34;https://tweakers.net/nieuws/101397/belgische-banken-hebben-ssl-beveiliging-niet-op-orde.html&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Tweakers&lt;/a&gt; (Dutch website, oddly enough).&lt;/p&gt;&#xA;&lt;p&gt;OS wise, about 60% is Windows, 12% of OSX and 10% of iOS; 79% desktop, 15% phones, 6% tablets. Way more mobile than I expected to be honest.&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://static.yeri.be/2015/02/slashdot.jpg" alt="Belgian bank &amp; SSL slashdot effect"></p><p>Quick wrap up of the <a href="https://en.wikipedia.org/wiki/Slashdot_effect" target="_blank" rel="noopener noreferrer">slashdot effect</a> 10 days ago.</p>
<p>A peak of 12k views on Monday 16/02, with a small&nbsp;buildup on Sunday (15/02).</p>
<figure class="wp-block-image"><a href="https://static.yeri.be/2015/02/slashdot.png"><img src="https://static.yeri.be/2015/02/slashdot-1024x306.png" alt="slashdot" class="wp-image-7007"/></a></figure>
<p class="has-text-align-center"></p>
<p>The top pages were <a href="https://yeri.be/belgian-banks-ssl-part-3">Part 3</a>, <a href="https://yeri.be/belgian-banks-ssl">Part 1</a>, <a href="https://yeri.be/belgian-banks-ssl-part-4">Part 4</a> and <a href="https://yeri.be/belgian-banks-ssl-part-2">Part 2</a> respectively.</p>
<p>De Redactie is the highest referrer, surpassing <a href="https://twitter.com/demorgen/status/567268960047874048" target="_blank" rel="noopener noreferrer">De Morgen</a> (first to publish in printed media, front page) &amp; <a href="http://datanews.knack.be/ict/ssl-beveiliging-van-de-belgische-banken-zo-lek-als-een-zeef/article-normal-533611.html" target="_blank" rel="noopener noreferrer">Datanews</a>&nbsp;(first to publish online):</p>
<figure class="wp-block-image"><a href="https://static.yeri.be/2015/02/referrer.png"><img src="https://static.yeri.be/2015/02/referrer-1024x367.png" alt="referrer" class="wp-image-7008"/></a></figure>
<p class="has-text-align-center"></p>
<p>Second highest, after Twitter (<a href="https://t.co/" target="_blank" rel="noopener noreferrer">t.co</a>), was <a href="https://tweakers.net/nieuws/101397/belgische-banken-hebben-ssl-beveiliging-niet-op-orde.html" target="_blank" rel="noopener noreferrer">Tweakers</a> (Dutch website, oddly enough).</p>
<p>OS wise, about 60% is Windows, 12% of OSX and 10% of iOS; 79% desktop, 15% phones, 6% tablets. Way more mobile than I expected to be honest.</p>
<p>This was easily handled on a Debian virtual machine: running a&nbsp;dual core Xeon vCPU (3.2Ghz) with 2Gb of RAM. Nginx as webserver. No slowdown was noticed. Google Analytics reported peaks of ~100 concurrent users (but not sure what timeframe they consider "concurrent").</p>
<figure class="wp-block-image"><a href="https://static.yeri.be/2015/02/network.png"><img src="https://static.yeri.be/2015/02/network.png" alt="network" class="wp-image-7010"/></a></figure>
<p class="has-text-align-center"></p>
<p>There was, what looks like, a DoS on Monday around 12h00 for about 30 minutes causing a 100% load (2.00 linux load, on 2 vCPUs), however there was no out of the ordinary traffic data peak -- but I didn't have time to look into it, and by the time I had notice it was already long over.</p>
<figure class="wp-block-image"><a href="https://static.yeri.be/2015/02/load.png"><img src="https://static.yeri.be/2015/02/load.png" alt="load" class="wp-image-7011"/></a></figure>
<p class="has-text-align-center"></p>
<figure class="wp-block-image"><a href="https://static.yeri.be/2015/02/cpu.png"><img src="https://static.yeri.be/2015/02/cpu.png" alt="cpu" class="wp-image-7012"/></a></figure>
<p class="has-text-align-center"></p>
<p>Interesting networks:</p>
<ul>
<li>Usually Telenet &amp; Belgacom consumer networks&nbsp;are&nbsp;high above anything else (they were still #1 and #2 respectively, this time), but closely following up where a lot of corporate networks, as as these:</li>
<li>Bank van Breda (177 pageviews)</li>
<li>ING (167)</li>
<li>Fortis (125)</li>
<li>KBC (114)</li>
<li>AXA (104)</li>
<li>And others (&lt; 50 pageviews) Ogone, HP, Crelan, Argenta, Infrabel, Deutsche Bank, Microsoft, Vlaamse Overheid, AGFA, Getronics, De Post, etc.</li>
</ul>
<p>Interesting referrers:</p>
<ul>
<li>a bunch of intranets (<a href="http://insite.fedict.be" target="_blank" rel="noopener noreferrer">fedict</a>, <a href="http://kbcgroup.sharepoint.com" target="_blank" rel="noopener noreferrer">kbc</a>, <a href="http://buzz.ing.intranet" target="_blank" rel="noopener noreferrer">ing</a>),</li>
<li>a bunch of bank website &amp; mailings: updated list on <a href="https://yeri.be/belgian-banks-ssl-part-4">part 4</a>.</li>
</ul>
<p>Interesting reads:</p>
<ul>
<li><a href="http://frank.be/waarom-poedels-geen-excuus-meer-zijn-voor-banken/" target="_blank" rel="noopener noreferrer">Frank</a>,</li>
<li>And a few comments on part 3 and part 4.</li>
</ul>
<p>Ripple effect:</p>
<ul>
<li>Same tests <a href="https://www.aeyoun.com/posts/tls-ratings-norwegian-banks.html" target="_blank" rel="noopener noreferrer">in Norway</a>.</li>
</ul>
]]></content:encoded>
      <category>misc</category>
      <category>1</category><category>2</category><category>belgium</category><category>media</category><category>slashdot</category><category>ssl</category>
    </item>
    
    <item>
      <title>Belgian banks &amp; SSL — part 4</title>
      <link>https://yeri.be/belgian-banks-ssl-part-4/</link>
      <pubDate>Mon, 16 Feb 2015 20:32:24 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/belgian-banks-ssl-part-4/</guid>
      <description>&lt;p&gt;Because of the &lt;a href=&#34;https://www.google.be/search?ie=UTF-8&amp;amp;q=yeri+tiete+ssl&amp;amp;gws_rd=cr&amp;amp;ei=6x_jVPHHIpG5adrIgNgJ&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;mediastorm&lt;/a&gt; it&amp;rsquo;s time for an update. The previous (&lt;a href=&#34;https://yeri.be/belgian-banks-ssl&#34;&gt;1&lt;/a&gt;, &lt;a href=&#34;https://yeri.be/belgian-banks-ssl-part-2&#34;&gt;2&lt;/a&gt;, &lt;a href=&#34;https://yeri.be/belgian-banks-ssl-part-3&#34;&gt;3&lt;/a&gt;) blog posts are &lt;strong&gt;outdated&lt;/strong&gt;!&lt;/p&gt;&#xA;&lt;p&gt;I&amp;rsquo;ll do my usual &lt;a href=&#34;https://yeri.be/irail-slashdot-effect&#34;&gt;slashdot-effect&lt;/a&gt; post in a couple of days (it&amp;rsquo;s already at 10k views today).&lt;/p&gt;&#xA;&lt;p&gt;Banks that changed rank since last post (all for the better):&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;    &lt;li&gt;16/02/2015:&#xA;&lt;ul&gt;&#xA;    &lt;li&gt;Keytrade: B to A&lt;/li&gt;&#xA;    &lt;li&gt;Hello Bank!: C to A&lt;/li&gt;&#xA;    &lt;li&gt;ING: F to A-&lt;/li&gt;&#xA;    &lt;li&gt;Record Bank: F to A-&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;    &lt;li&gt;17/02/2015:&#xA;&lt;ul&gt;&#xA;    &lt;li&gt;ABK: F to B&lt;/li&gt;&#xA;    &lt;li&gt;Bank Van Breda: C to B&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;    &lt;li&gt;18/02/2015:&#xA;&lt;ul&gt;&#xA;    &lt;li&gt;MeDirect: F to A&lt;/li&gt;&#xA;    &lt;li&gt;Added 6 new (small) banks&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;    &lt;li&gt;27/02/2015&#xA;&lt;ul&gt;&#xA;    &lt;li&gt;Ogone: C to A-&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;    &lt;li&gt;02/03/2015&#xA;&lt;ul&gt;&#xA;    &lt;li&gt;Fortuneo: C to B&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;    &lt;li&gt;03/03/2015&#xA;&lt;ul&gt;&#xA;    &lt;li&gt;Crelan: B to A&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;I cannot test &lt;a href=&#34;https://www.ssllabs.com/ssltest/analyze.html?d=www.europabank.be&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Europabank&lt;/a&gt; using SSL Labs. I can only speculate they &lt;a href=&#34;https://www.ssllabs.com/about/assessment.html&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;requested SSL Labs to not scan them&lt;/a&gt;. I have also added a couple new banks (Delta Lloyd, Deutsche Bank, Moneyou, Fortuneo, BKCP, Binck, and Isabel as bank tool).&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>Because of the <a href="https://www.google.be/search?ie=UTF-8&amp;q=yeri+tiete+ssl&amp;gws_rd=cr&amp;ei=6x_jVPHHIpG5adrIgNgJ" target="_blank" rel="noopener noreferrer">mediastorm</a> it&rsquo;s time for an update. The previous (<a href="https://yeri.be/belgian-banks-ssl">1</a>, <a href="https://yeri.be/belgian-banks-ssl-part-2">2</a>, <a href="https://yeri.be/belgian-banks-ssl-part-3">3</a>) blog posts are <strong>outdated</strong>!</p>
<p>I&rsquo;ll do my usual <a href="https://yeri.be/irail-slashdot-effect">slashdot-effect</a> post in a couple of days (it&rsquo;s already at 10k views today).</p>
<p>Banks that changed rank since last post (all for the better):</p>
<ul>
    <li>16/02/2015:
<ul>
    <li>Keytrade: B to A</li>
    <li>Hello Bank!: C to A</li>
    <li>ING: F to A-</li>
    <li>Record Bank: F to A-</li>
</ul>
</li>
    <li>17/02/2015:
<ul>
    <li>ABK: F to B</li>
    <li>Bank Van Breda: C to B</li>
</ul>
</li>
    <li>18/02/2015:
<ul>
    <li>MeDirect: F to A</li>
    <li>Added 6 new (small) banks</li>
</ul>
</li>
    <li>27/02/2015
<ul>
    <li>Ogone: C to A-</li>
</ul>
</li>
    <li>02/03/2015
<ul>
    <li>Fortuneo: C to B</li>
</ul>
</li>
    <li>03/03/2015
<ul>
    <li>Crelan: B to A</li>
</ul>
</li>
</ul>
<p>I cannot test <a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.europabank.be" target="_blank" rel="noopener noreferrer">Europabank</a> using SSL Labs. I can only speculate they <a href="https://www.ssllabs.com/about/assessment.html" target="_blank" rel="noopener noreferrer">requested SSL Labs to not scan them</a>. I have also added a couple new banks (Delta Lloyd, Deutsche Bank, Moneyou, Fortuneo, BKCP, Binck, and Isabel as bank tool).</p>
<p>I would like to apologise for every IT&rsquo;er that had a crappy Monday morning, and thank you for fixing SSL so fast. :)</p>
<p>The entire <strong>list updated </strong>(last partial update 18/02/2015 around 20h00):</p>
<p>I&rsquo;ve updated the sites to now correctly test the login page and not the main homepage. If that&rsquo;s not the case somewhere, please tell me.</p>
<p><span style="color: #008000;">Grade A</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure1.rabobank.be" target="_blank" rel="noopener noreferrer">Rabobank</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>. Support for HTTP Strict Transport Security and prevented downgrade attacks.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=banking.triodos.be&amp;latest" target="_blank" rel="noopener noreferrer">Triodos</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>. Support for HTTP Strict Transport Security and prevented downgrade attacks.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.evi.be" target="_blank" rel="noopener noreferrer">Evi</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=crelan-online.be" target="_blank" rel="noopener noreferrer">Crelan</a> (<span style="color: #339966;">A</span>): weak signature (SHA1).</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.deltalloydbank.be" target="_blank" rel="noopener noreferrer">Delta Lloyd Bank</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>. [<a href="https://www.deltalloydbank.be/nl/actueel/detail/probleem-met-het-beveiligingsniveau-van-onze-websites" target="_blank" rel="noopener noreferrer">news post</a>]</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.deutschebank.be" target="_blank" rel="noopener noreferrer">Deutsche Bank</a> (<span style="color: #339966;">A</span>): weak signature (SHA1).</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.hellobank.be" target="_blank" rel="noopener noreferrer">Hello bank!</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.keytradebank.be&amp;s=93.191.218.12" target="_blank" rel="noopener noreferrer">Keytrade Bank</a> (<span style="color: #339966;">A</span>): weak signature (SHA1, intermediate, very very minor issue).</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=elogin.medirectbank.be" target="_blank" rel="noopener noreferrer">MeDirect Bank</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>. [newsletter: <a href="https://static.yeri.be/2015/02/medirect.jpg" target="_blank" rel="noopener noreferrer">1</a>, <a href="https://static.yeri.be/2015/02/medirect2.png" target="_blank" rel="noopener noreferrer">2</a>]</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.montepaschi.be" target="_blank" rel="noopener noreferrer">Monte Paschi</a> (<span style="color: #339966;">A</span>): <span style="color: #339966;">no known issues</span>.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.belfius.be&amp;s=212.63.233.37" target="_blank" rel="noopener noreferrer">Belfius</a> (<span style="color: #339966;">A-</span>): weak signature (SHA1), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.bnpparibasfortis.be&amp;s=193.58.4.82" target="_blank" rel="noopener noreferrer">BNP Paribas Fortis</a> (<span style="color: #339966;">A-</span>): weak signature (SHA1), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.bpostbank.be" target="_blank" rel="noopener noreferrer">bpost bank</a> (<span style="color: #339966;">A-</span>): weak signature (SHA1), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=login.binck.be&amp;hideResults=on" target="_blank" rel="noopener noreferrer">Binck</a> (<span style="color: #339966;">A-</span>): weak signature (SHA1), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=fintro.be" target="_blank" rel="noopener noreferrer">Fintro</a> (<span style="color: #339966;">A-</span>): weak signature (SHA1), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.ing.be&amp;s=193.58.129.66&amp;hideResults=on" target="_blank" rel="noopener noreferrer">ING</a> (<span style="color: #339966;">A-</span>): no Forward Secrecy. [<a href="http://www.standaard.be/cnt/dmf20150216_01531736" target="_blank" rel="noopener noreferrer">press release via Standaard</a>]</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=moneyou.be" target="_blank" rel="noopener noreferrer">Moneyou</a> (<span style="color: #339966;">A-</span>): weak signature (SHA1), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=homebank.recordbank.be" target="_blank" rel="noopener noreferrer">Record Bank</a> (<span style="color: #339966;">A-</span>): no Forward Secrecy. [<a href="https://static.yeri.be/2015/02/recordbank.png" target="_blank" rel="noopener noreferrer">news post</a>]</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=isabel.eu" target="_blank" rel="noopener noreferrer">Isabel</a> (banking tool for big corps - <span style="color: #339966;">A-</span>): weak signature (SHA1), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.ogone.com" target="_blank" rel="noopener noreferrer">Ogone</a> (payment facilitator): no Forward Secrecy. [<a href="https://twitter.com/stroobl/status/567586488712699905" target="_blank" rel="noopener noreferrer">newsletter via twitter</a>]</li>
</ul>
<p><span style="color: #ff6600;">Grade B</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=internetbanking.argenta.be" target="_blank" rel="noopener noreferrer">Argenta</a>: SSL3 (insecure), weak signature (SHA1), RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=abkonline.abk.be" target="_blank" rel="noopener noreferrer">ABK</a>: weak signature (SHA1), no TLS 1.2, no Forward Secrecy, no support for secure renegotiation. [<a href="https://yeri.be/belgian-banks-ssl-part-4/comment-page-1#comment-32154">update</a>]</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=fe.axa.be" target="_blank" rel="noopener noreferrer">AXA</a>: weak signature (SHA1), SSL3 (insecure), RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.vanbredaonline.be" target="_blank" rel="noopener noreferrer">Bank Van Breda</a>: weak signature (SHA1), no TLS 1.2, no Forward Secrecy, no support for secure renegotiation. [<a href="https://yeri.be/belgian-banks-ssl-part-4/comment-page-1#comment-32154">update</a>]</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=beobank.be" target="_blank" rel="noopener noreferrer">beobank</a>: weak signature (SHA1), no TLS 1.2, RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=ident.bkcp.be&amp;hideResults=on&amp;latest" target="_blank" rel="noopener noreferrer">BKCP</a>: weak signature (SHA1), no TLS 1.2, RC4 (insecure), no Forward Secrecy. [<a href="https://static.yeri.be/2015/02/bkcp.png" target="_blank" rel="noopener noreferrer">newsletter</a>]</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=cph.be" target="_blank" rel="noopener noreferrer">CPH</a>: no TLS 1.2, RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=netbanking.dhbbank.com" target="_blank" rel="noopener noreferrer">DHB Bank</a>: weak signature (SHA1), RC4 (insecure).</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=fortuneo.be&amp;s=93.20.42.107" target="_blank" rel="noopener noreferrer">Fortuneo</a>: weak signature (SHA1), no TLS 1.2, no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.kbc.be">KBC</a>: weak signature (SHA1), no TLS 1.2, no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=ebanking.nibcdirect.be" target="_blank" rel="noopener noreferrer">NIBC Direct</a>: weak signature (SHA1), RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=online.vdk.be" target="_blank" rel="noopener noreferrer">VDK</a>: SSL3 (insecure),no TLS 1.2, weak signature (SHA1), RC4 (insecure), no Forward Secrecy</li>
</ul>
<p><span style="color: #ff0000;">Grade C</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.psabank.be&amp;s=93.20.46.143&amp;hideResults=on" target="_blank" rel="noopener noreferrer">PSA Bank</a>: weak signature (SHA1), no TLS 1.2, RC4 (insecure), no Forward Secrecy.</li>
</ul>
<p><span style="color: #ff0000;">Grade D</span></p>
<ul>
    <li>n/a</li>
</ul>
<p><span style="color: #ff0000;">Grade E</span></p>
<ul>
    <li>n/a</li>
</ul>
<p><span style="color: #ff0000;">Grade F</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=optimaonline.optimabank.be" target="_blank" rel="noopener noreferrer">Optima Bank</a>: vulnerable to POODLE attack in SSL3 and TLS format, weak signature (SHA1), RC4, no Forward Secrecy.</li>
</ul>
<p>Information about SSL Labs grading can be found <a href="https://web.archive.org/web/20170119124000/https://www.ssllabs.com/downloads/SSL_Server_Rating_Guide.pdf" target="_blank" rel="noopener noreferrer">here</a>. Grade A (+) being the best possible ranking, and F the worst.</p>
<p>Respect to those that send a mailing list to their customers with more detailed information. Communication++</p>
<p>Respect to Rabobank to be the only bank that directly contacted me (officially, not hiding behind a Gmail or Hotmail address) and thanked me for the work I did, asking for more details, etc.</p>
<p>And thank you for an anonymous person, working for one of the big banks, to give me more details about why they are slow at patching this, how legacy works, etc. I wish he could take this discussion public, but alas.</p>
]]></content:encoded>
      <category>linux</category><category>misc</category><category>networking</category><category>software</category><category>www</category>
      <category>belgium</category><category>ssl</category>
    </item>
    
    <item>
      <title>Belgian banks &amp; SSL — part 3</title>
      <link>https://yeri.be/belgian-banks-ssl-part-3/</link>
      <pubDate>Sun, 15 Feb 2015 11:11:42 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/belgian-banks-ssl-part-3/</guid>
      <description>&lt;p&gt;&lt;span style=&#34;text-decoration: underline;&#34;&gt;&lt;strong&gt;EDIT&lt;/strong&gt;&lt;/span&gt;: ING is now A- (not reflected in this blog post).&#xA;&lt;strong&gt;&lt;span style=&#34;text-decoration: underline;&#34;&gt;EDIT 2&lt;/span&gt;&lt;/strong&gt;: Keytrade &amp;amp; Hello Bank also went to A. I&amp;rsquo;ll post a new blog post later tonight.&#xA;&lt;strong&gt;&lt;span style=&#34;text-decoration: underline;&#34;&gt;EDIT 3&lt;/span&gt;&lt;/strong&gt;: Updated post &lt;a href=&#34;https://yeri.be/belgian-banks-ssl-part-4&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Part three, or how I single-handedly &amp;ldquo;fixed&amp;rdquo; SSL at the Belgian banks. ;)&lt;/p&gt;&#xA;&lt;p&gt;Part &lt;a href=&#34;https://yeri.be/belgian-banks-ssl&#34;&gt;one&lt;/a&gt; and &lt;a href=&#34;https://yeri.be/belgian-banks-ssl-part-2&#34;&gt;two&lt;/a&gt; are available here. Not related but useful nonetheless &lt;a href=&#34;http://web.archive.org/web/20260116231349/https://www.nytimes.com/2015/02/15/world/bank-hackers-steal-millions-via-malware.html&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;NY Times article&lt;/a&gt; about bank hackers.&lt;/p&gt;&#xA;&lt;p&gt;Argenta &lt;a href=&#34;https://www.facebook.com/argenta/posts/10206360815449230&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;promised to fix their SSL&lt;/a&gt;, so it&amp;rsquo;s the time to check everything again.&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p><span style="text-decoration: underline;"><strong>EDIT</strong></span>: ING is now A- (not reflected in this blog post).
<strong><span style="text-decoration: underline;">EDIT 2</span></strong>: Keytrade &amp; Hello Bank also went to A. I&rsquo;ll post a new blog post later tonight.
<strong><span style="text-decoration: underline;">EDIT 3</span></strong>: Updated post <a href="https://yeri.be/belgian-banks-ssl-part-4">here</a>.</p>
<p>Part three, or how I single-handedly &ldquo;fixed&rdquo; SSL at the Belgian banks. ;)</p>
<p>Part <a href="https://yeri.be/belgian-banks-ssl">one</a> and <a href="https://yeri.be/belgian-banks-ssl-part-2">two</a> are available here. Not related but useful nonetheless <a href="http://web.archive.org/web/20260116231349/https://www.nytimes.com/2015/02/15/world/bank-hackers-steal-millions-via-malware.html" target="_blank" rel="noopener noreferrer">NY Times article</a> about bank hackers.</p>
<p>Argenta <a href="https://www.facebook.com/argenta/posts/10206360815449230" target="_blank" rel="noopener noreferrer">promised to fix their SSL</a>, so it&rsquo;s the time to check everything again.</p>
<p>TL;DR: Only Argenta&rsquo;s status changed for the better.</p>
<p>Those that <strong>did not</strong> change:</p>
<ul>
    <li><span style="color: #339966;">Rabobank</span>: A+</li>
    <li><span style="color: #339966;">Triodos</span>: A+</li>
    <li><span style="color: #339966;">Belfius</span>: A-</li>
    <li><span style="color: #339966;">BNP Paribas Fortis</span>: A-</li>
    <li><span style="color: #339966;">bpost bank</span>: A-</li>
    <li><span style="color: #ff9900;">AXA</span>: B</li>
    <li><span style="color: #ff9900;">beobank</span>: B</li>
    <li><span style="color: #ff9900;">CPH</span>: B</li>
    <li><span style="color: #ff9900;">KBC</span>: B</li>
    <li><span style="color: #ff9900;">Keytrade Bank</span>: B</li>
    <li><span style="color: #ff9900;">Crelan</span> (internet banking): B</li>
    <li><span style="color: #ff0000;">Hello bank!</span>: C</li>
    <li><span style="color: #ff0000;">Bank Van Breda</span> (internet banking): C
<ul>
    <li>BvB no longer supports <a href="https://community.qualys.com/blogs/securitylabs/2010/10/06/disabling-ssl-renegotiation-is-a-crutch-not-a-fix" target="_blank" rel="noopener noreferrer">secure renegotiation</a> (which, afaik, it did before). However, it's still rated as C, as this isn't a real issue.</li>
</ul>
</li>
    <li><span style="color: #ff0000;">ING</span>: F</li>
    <li><span style="color: #ff0000;">Record Bank</span> (internet banking): F</li>
</ul>
<p>Those that <strong>did</strong> change:</p>
<ul>
    <li>Argenta (internet banking): <span style="color: #ff0000;">F</span> to <span style="color: #ff9900;">B</span>
<ul>
    <li><span style="color: #339966;">No longer vulnerable to POODLE</span>,</li>
    <li>Support for <span style="color: #339966;">protocol downgrade attacks prevention</span>,</li>
    <li><span style="color: #ff9900;">Still using SSL3 </span>(obsolete and insecure),</li>
    <li><span style="color: #ff9900;">Weak signature </span>(SHA1),</li>
    <li><span style="color: #ff9900;">RC4 cipher is supported</span> (insecure),</li>
    <li><span style="color: #ff9900;">No Forward Secrecy</span>.</li>
</ul>
</li>
</ul>
<p>Still a little way to go for Argenta, but it&rsquo;s on the right path.</p>
<p>Those that I <strong>hadn&rsquo;t tested</strong> before:</p>
<ul>
    <li><span style="color: #ff9900;">VDK</span>: B</li>
    <li><span style="color: #ff0000;">ABK</span>: F</li>
    <li><span style="color: #ff0000;">MeDirect Bank</span>: F</li>
    <li><span style="color: #ff0000;">Ogone</span>: C (technically not a bank, and <a href="https://twitter.com/stroobl/status/561920969800171520" target="_blank" rel="noopener noreferrer">promised a fix</a>, but it <a href="https://twitter.com/stroobl/status/566910029685850112" target="_blank" rel="noopener noreferrer">got delayed</a>).</li>
</ul>
<hr />
<p>The entire <strong>list updated</strong>:</p>
<p><span style="color: #008000;">Grade A</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.rabobank.be&amp;s=172.230.225.200" target="_blank" rel="noopener noreferrer">Rabobank</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>. Support for HTTP Strict Transport Security and prevented downgrade attacks.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.triodos.be" target="_blank" rel="noopener noreferrer">Triodos</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>. Support for HTTP Strict Transport Security and prevented downgrade attacks.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.belfius.be&amp;s=212.63.233.37" target="_blank" rel="noopener noreferrer">Belfius</a> (<span style="color: #339966;">A-</span>): weak signature (SHA1), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.bnpparibasfortis.be&amp;s=193.58.4.82" target="_blank" rel="noopener noreferrer">BNP Paribas Fortis</a>: (<span style="color: #339966;">A-</span>) weak signature (SHA1), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.bpostbank.be" target="_blank" rel="noopener noreferrer">bpost bank</a>: (<span style="color: #339966;">A-</span>) weak signature (SHA1), no Forward Secrecy.</li>
</ul>
<p><span style="color: #ff6600;">Grade B</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=argenta.be" target="_blank" rel="noopener noreferrer">Argenta</a>: no SSL on main page.
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=internetbanking.argenta.be" target="_blank" rel="noopener noreferrer">internet banking</a>: SSL3 (insecure), weak signature (SHA1), RC4 (insecure), no Forward Secrecy.</li>
</ul>
</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.axa.be" target="_blank" rel="noopener noreferrer">AXA</a>: weak signature (SHA1), SSL3 (insecure), RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=beobank.be" target="_blank" rel="noopener noreferrer">beobank</a>: weak signature (SHA1), no TLS 1.2, RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=cph.be" target="_blank" rel="noopener noreferrer">CPH</a>: no TLS 1.2, RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.kbc.be">KBC</a>: weak signature (SHA1), no TLS 1.2, no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.keytradebank.be&amp;s=93.191.218.12" target="_blank" rel="noopener noreferrer">Keytrade Bank</a>: weak signature (SHA1), RC4 (insecure).</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=online.vdk.be" target="_blank" rel="noopener noreferrer">VDK</a>: SSL3 (insecure),no TLS 1.2, weak signature (SHA1), RC4 (insecure), no Forward Secrecy</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=crelan.be&amp;latest" target="_blank" rel="noopener noreferrer">Crelan</a>: <span style="color: #33cccc;">no SSL on main page.</span>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=crelan-online.be" target="_blank" rel="noopener noreferrer">internet banking</a>: weak signature (SHA1), SSL3 (insecure), no TLS 1.2, RC4, no Forward Secrecy.</li>
</ul>
</li>
</ul>
<p><span style="color: #ff0000;">Grade C</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.hellobank.be" target="_blank" rel="noopener noreferrer">Hello bank!</a>: vulnerable to POODLE attack, weak signature (SHA1), RC4 (insecure).</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=bankvanbreda.be&amp;latest" target="_blank" rel="noopener noreferrer">Bank Van Breda</a>: <span style="color: #33cccc;">no SSL on main page.</span>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.vanbredaonline.be" target="_blank" rel="noopener noreferrer">internet banking</a>: vulnerable to POODLE attack, weak signature (SHA1), no TLS 1.2, no Forward Secrecy, no support for secure renegotiation.</li>
</ul>
</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.ogone.com" target="_blank" rel="noopener noreferrer">Ogone</a>: payment facilitator
<ul>
    <li>weak signature (SHA1), RC4, vulnerable to POODLE, no Forward Secrecy</li>
</ul>
</li>
</ul>
<p><span style="color: #ff0000;">Grade D</span></p>
<ul>
    <li>n/a</li>
</ul>
<p><span style="color: #ff0000;">Grade E</span></p>
<ul>
    <li>n/a</li>
</ul>
<p><span style="color: #ff0000;">Grade F</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=abkonline.abk.be" target="_blank" rel="noopener noreferrer">ABK</a>: SSL2 (insecure), vulnerable to POODLE attack, weak signature (SHA1), RC4 (insecure), no Forward Secrecy, no TLS 1.2.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.ing.be&amp;s=193.58.129.66&amp;hideResults=on" target="_blank" rel="noopener noreferrer">ING</a>: vulnerable to POODLE attack, SSL3 (insecure), weak signature (SHA1), RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=elogin.medirectbank.be" target="_blank" rel="noopener noreferrer">MeDirect Bank</a>: vulnerable to POODLE attack, <a href="https://community.qualys.com/blogs/securitylabs/2014/06/13/ssl-pulse-49-vulnerable-to-cve-2014-0224-14-exploitable" target="_blank" rel="noopener noreferrer">OpenSSL CCS vulnerability</a> (quite bad),</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=recordbank.be&amp;latest" target="_blank" rel="noopener noreferrer">Record Bank</a>: <span style="color: #33cccc;">no SSL on main page.</span>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=homebank.recordbank.be" target="_blank" rel="noopener noreferrer">internet banking</a>: vulnerable to POODLE attack, RC4 (insecure), no Forward Secrecy.</li>
</ul>
</li>
</ul>
<p>Information about SSL Labs grading can be found <a href="https://web.archive.org/web/20170119124000/https://www.ssllabs.com/downloads/SSL_Server_Rating_Guide.pdf" target="_blank" rel="noopener noreferrer">here</a>. Grade A (+) being the best possible ranking, and F the worst.</p>
<p>Also, shame on you ING. More than any other bank.</p>
]]></content:encoded>
      <category>linux</category><category>misc</category><category>networking</category><category>software</category><category>windows</category><category>www</category>
      <category>belgium</category><category>ssl</category>
    </item>
    
    <item>
      <title>Belgian banks &amp; SSL -- part 2</title>
      <link>https://yeri.be/belgian-banks-ssl-part-2/</link>
      <pubDate>Sun, 01 Feb 2015 11:32:43 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/belgian-banks-ssl-part-2/</guid>
      <description>&lt;p&gt;I previously wrote about &lt;a href=&#34;https://yeri.be/belgian-banks-ssl&#34;&gt;Belgian banks &amp;amp; SSL&lt;/a&gt;. Updated version (15/02/2015) &lt;a href=&#34;https://yeri.be/belgian-banks-ssl-part-3&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Going through my Google Analytics I noticed some noteworthy network domains, which Google discribes as &amp;ldquo;The fully qualified domain names of your visitors&amp;rsquo; Internet service providers (ISPs)&amp;rdquo;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.35.01.png&#34;&gt;&lt;img class=&#34;alignnone size-full wp-image-6815&#34; src=&#34;https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.35.01.png&#34; alt=&#34;Screen Shot 2015-02-01 at 01.35.01&#34; width=&#34;651&#34; height=&#34;34&#34; /&gt;&lt;/a&gt;&lt;a href=&#34;https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.35.23.png&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6816&#34; src=&#34;https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.35.23.png&#34; alt=&#34;Screen Shot 2015-02-01 at 01.35.23&#34; width=&#34;650&#34; height=&#34;34&#34; /&gt;&lt;/a&gt;&lt;a href=&#34;https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.35.34.png&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6817&#34; src=&#34;https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.35.34.png&#34; alt=&#34;Screen Shot 2015-02-01 at 01.35.34&#34; width=&#34;650&#34; height=&#34;33&#34; /&gt;&lt;/a&gt;&lt;a href=&#34;https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.36.59.png&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6818&#34; src=&#34;https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.36.59.png&#34; alt=&#34;Screen Shot 2015-02-01 at 01.36.59&#34; width=&#34;649&#34; height=&#34;103&#34; /&gt;&lt;/a&gt;&lt;a href=&#34;https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.37.32.png&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6819&#34; src=&#34;https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.37.32.png&#34; alt=&#34;Screen Shot 2015-02-01 at 01.37.32&#34; width=&#34;651&#34; height=&#34;34&#34; /&gt;&lt;/a&gt;&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>I previously wrote about <a href="https://yeri.be/belgian-banks-ssl">Belgian banks &amp; SSL</a>. Updated version (15/02/2015) <a href="https://yeri.be/belgian-banks-ssl-part-3">here</a>.</p>
<p>Going through my Google Analytics I noticed some noteworthy network domains, which Google discribes as &ldquo;The fully qualified domain names of your visitors&rsquo; Internet service providers (ISPs)&rdquo;.</p>
<p><a href="https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.35.01.png"><img class="alignnone size-full wp-image-6815" src="https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.35.01.png" alt="Screen Shot 2015-02-01 at 01.35.01" width="651" height="34" /></a><a href="https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.35.23.png"><img class="alignnone size-large wp-image-6816" src="https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.35.23.png" alt="Screen Shot 2015-02-01 at 01.35.23" width="650" height="34" /></a><a href="https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.35.34.png"><img class="alignnone size-large wp-image-6817" src="https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.35.34.png" alt="Screen Shot 2015-02-01 at 01.35.34" width="650" height="33" /></a><a href="https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.36.59.png"><img class="alignnone size-large wp-image-6818" src="https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.36.59.png" alt="Screen Shot 2015-02-01 at 01.36.59" width="649" height="103" /></a><a href="https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.37.32.png"><img class="alignnone size-large wp-image-6819" src="https://static.yeri.be/2015/02/Screen-Shot-2015-02-01-at-01.37.32.png" alt="Screen Shot 2015-02-01 at 01.37.32" width="651" height="34" /></a></p>
<p>There are a few more (Belgian) government institutions and universities, and the top in the list are &ldquo;(not set)&rdquo; and &ldquo;unknown&rdquo;.</p>
<p>Clearly some people at the banks read the post during their work time. So it&rsquo;s only fair to recheck the websites&hellip; Here goes:</p>
<p>Those that I <strong>hadn&rsquo;t tested</strong> before:</p>
<ul>
    <li><span style="color: #ff9900;">CPH</span>: B</li>
    <li><span style="color: #ff0000;">Record Bank</span> (internet banking): F</li>
</ul>
<p>Those that <strong>did not</strong> change:</p>
<ul>
    <li><span style="color: #339966;">Rabobank</span>: A+</li>
    <li><span style="color: #339966;">Belfius</span>: A-</li>
    <li><span style="color: #ff9900;">AXA</span>: B</li>
    <li><span style="color: #ff9900;">beobank</span>: B</li>
    <li><span style="color: #ff9900;">KBC</span>: B</li>
    <li><span style="color: #ff9900;">Keytrade Bank</span>: B</li>
    <li><span style="color: #ff9900;">Crelan</span> (internet banking): B</li>
    <li><span style="color: #ff0000;">Hello bank!</span>: C</li>
    <li><span style="color: #ff0000;">Bank Van Breda</span> (internet banking): C</li>
    <li><span style="color: #ff0000;">ING</span>: F</li>
    <li><span style="color: #ff0000;">Argenta</span> (internet banking): F</li>
</ul>
<p>Those that <strong>did</strong> change:</p>
<ul>
    <li><span style="color: #339966;">Triodos</span>: <span style="color: #339966;">A</span> to <span style="color: #339966;">A+</span>
<ul>
    <li>downgrade prevention correctly applied.</li>
</ul>
</li>
    <li><span style="color: #339966;">BNP Paribas Fortis</span>: <span style="color: #ff0000;">F</span> to <span style="color: #339966;">A-</span>
<ul>
    <li>No longer vulnerable to POODLE,</li>
    <li>Disabled SSL3 (insecure),</li>
    <li>Disabled RC4 (insecure),</li>
    <li>Still using a weak signature (SHA1),</li>
    <li>No Forward Secrecy.</li>
</ul>
</li>
    <li><span style="color: #339966;">bpost bank</span>: <span style="color: #ff0000;">F</span> to <span style="color: #339966;">A-</span>
<ul>
    <li>No longer vulnerable to POODLE,</li>
    <li>Disabled SSL3 (insecure),</li>
    <li>Disabled RC4 (insecure),</li>
    <li>Still using a weak signature (SHA1),</li>
    <li>No Forward Secrecy.</li>
</ul>
</li>
</ul>
<p>Huge thumbs up for these last three banks! Well done, especially BNP &amp; bpost! :)</p>
<p>Keep on shaming the others.</p>
<hr />
<p>The entire <strong>list updated</strong>:</p>
<p><span style="color: #008000;">Grade A</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.rabobank.be&amp;s=172.230.225.200" target="_blank" rel="noopener noreferrer">Rabobank</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>. Support for HTTP Strict Transport Security and prevented downgrade attacks.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.triodos.be" target="_blank" rel="noopener noreferrer">Triodos</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>. Support for HTTP Strict Transport Security and prevented downgrade attacks.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.belfius.be&amp;s=212.63.233.37" target="_blank" rel="noopener noreferrer">Belfius</a> (<span style="color: #339966;">A-</span>): weak signature (SHA1), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.bnpparibasfortis.be&amp;s=193.58.4.82" target="_blank" rel="noopener noreferrer">BNP Paribas Fortis</a>: (<span style="color: #339966;">A-</span>) weak signature (SHA1), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.bpostbank.be" target="_blank" rel="noopener noreferrer">bpost bank</a>: (<span style="color: #339966;">A-</span>) weak signature (SHA1), no Forward Secrecy.</li>
</ul>
<p><span style="color: #ff6600;">Grade B</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.axa.be" target="_blank" rel="noopener noreferrer">AXA</a>: weak signature (SHA1), SSL3 (insecure), RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=beobank.be" target="_blank" rel="noopener noreferrer">beobank</a>: weak signature (SHA1), no TLS 1.2, RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=cph.be" target="_blank" rel="noopener noreferrer">CPH</a>: no TLS 1.2, RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.kbc.be">KBC</a>: weak signature (SHA1), no TLS 1.2, no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.keytradebank.be&amp;s=93.191.218.12" target="_blank" rel="noopener noreferrer">Keytrade Bank</a>: weak signature (SHA1), RC4 (insecure).</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=crelan.be&amp;latest" target="_blank" rel="noopener noreferrer">Crelan</a>: <span style="color: #33cccc;">no SSL on main page.</span>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=crelan-online.be" target="_blank" rel="noopener noreferrer">internet banking</a>: weak signature (SHA1), SSL3 (insecure), no TLS 1.2, RC4, no Forward Secrecy.</li>
</ul>
</li>
</ul>
<p><span style="color: #ff0000;">Grade C</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.hellobank.be" target="_blank" rel="noopener noreferrer">Hello bank!</a>: vulnerable to POODLE attack, weak signature (SHA1), RC4 (insecure).</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=bankvanbreda.be&amp;latest" target="_blank" rel="noopener noreferrer">Bank Van Breda</a>: <span style="color: #33cccc;">no SSL on main page.</span>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.vanbredaonline.be" target="_blank" rel="noopener noreferrer">internet banking</a>: vulnerable to POODLE attack, weak signature (SHA1), no TLS 1.2, no Forward Secrecy.</li>
</ul>
</li>
</ul>
<p><span style="color: #ff0000;">Grade D</span></p>
<ul>
    <li>n/a</li>
</ul>
<p><span style="color: #ff0000;">Grade E</span></p>
<ul>
    <li>n/a</li>
</ul>
<p><span style="color: #ff0000;">Grade F</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.ing.be&amp;s=193.58.129.66&amp;hideResults=on" target="_blank" rel="noopener noreferrer">ING</a>: vulnerable to POODLE attack, SSL3 (insecure), weak signature (SHA1), RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=argenta.be" target="_blank" rel="noopener noreferrer">Argenta</a>: <span style="color: #33cccc;">no SSL on main page.</span>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=internetbanking.argenta.be" target="_blank" rel="noopener noreferrer">internet banking</a>: vulnerable to POODLE attack, SSL3 (insecure), weak signature (SHA1), RC4 (insecure), no Forward Secrecy.</li>
</ul>
</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=recordbank.be&amp;latest" target="_blank" rel="noopener noreferrer">Record Bank</a>: <span style="color: #33cccc;">no SSL on main page.</span>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=homebank.recordbank.be" target="_blank" rel="noopener noreferrer">internet banking</a>: vulnerable to POODLE attack, RC4 (insecure), no Forward Secrecy.</li>
</ul>
</li>
</ul>
<p>Information about SSL Labs grading can be found <a href="https://web.archive.org/web/20170119124000/https://www.ssllabs.com/downloads/SSL_Server_Rating_Guide.pdf" target="_blank" rel="noopener noreferrer">here</a>. Grade A (+) being the best possible ranking, and F the worst.</p>
]]></content:encoded>
      <category>linux</category><category>misc</category><category>networking</category><category>software</category><category>windows</category><category>www</category>
      <category>belgium</category><category>ssl</category>
    </item>
    
    <item>
      <title>Belgian banks &amp; SSL</title>
      <link>https://yeri.be/belgian-banks-ssl/</link>
      <pubDate>Tue, 20 Jan 2015 11:40:50 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/belgian-banks-ssl/</guid>
      <description>&lt;p&gt;Tested using &lt;a href=&#34;https://www.ssllabs.com&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;SSL Labs&lt;/a&gt; on 20/01/2015. Updated version 01/02/2015 &lt;a href=&#34;https://yeri.be/belgian-banks-ssl-part-2&#34;&gt;here&lt;/a&gt; and 15/02/2015 &lt;a href=&#34;https://yeri.be/belgian-banks-ssl-part-3&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Only providing the weak points. Once there is one SHA1 key in the chain, I will report everything as weak.&lt;/p&gt;&#xA;&lt;p&gt;Check SSL Labs for a full report, including what they actually did good (if anything).&lt;/p&gt;&#xA;&lt;p&gt;&lt;span style=&#34;color: #008000;&#34;&gt;Grade A&lt;/span&gt;&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;    &lt;li&gt;&lt;a href=&#34;https://www.ssllabs.com/ssltest/analyze.html?d=www.rabobank.be&amp;amp;s=172.230.225.200&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Rabobank&lt;/a&gt; (&lt;span style=&#34;color: #339966;&#34;&gt;A+&lt;/span&gt;): &lt;span style=&#34;color: #339966;&#34;&gt;no known issues&lt;/span&gt;. Support for &lt;a href=&#34;https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;HTTP Strict Transport Security&lt;/a&gt; and prevented &lt;a href=&#34;https://crypto.stackexchange.com/questions/10493/why-is-tls-susceptible-to-protocol-downgrade-attacks&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;downgrade attacks&lt;/a&gt;.&lt;/li&gt;&#xA;    &lt;li&gt;&lt;a href=&#34;https://www.ssllabs.com/ssltest/analyze.html?d=www.triodos.be&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Triodos&lt;/a&gt; (&lt;span style=&#34;color: #339966;&#34;&gt;A&lt;/span&gt;): no downgrade attack prevention.&lt;/li&gt;&#xA;    &lt;li&gt;&lt;a href=&#34;https://www.ssllabs.com/ssltest/analyze.html?d=www.belfius.be&amp;amp;s=212.63.233.37&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Belfius&lt;/a&gt; (&lt;span style=&#34;color: #339966;&#34;&gt;A-&lt;/span&gt;): weak signature (&lt;a href=&#34;https://community.qualys.com/blogs/securitylabs/2014/09/09/sha1-deprecation-what-you-need-to-know&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;SHA1&lt;/a&gt;), no &lt;a href=&#34;https://en.wikipedia.org/wiki/Forward_secrecy&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Forward Secrecy&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;span style=&#34;color: #ff6600;&#34;&gt;Grade B&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>Tested using <a href="https://www.ssllabs.com" target="_blank" rel="noopener noreferrer">SSL Labs</a> on 20/01/2015. Updated version 01/02/2015 <a href="https://yeri.be/belgian-banks-ssl-part-2">here</a> and 15/02/2015 <a href="https://yeri.be/belgian-banks-ssl-part-3">here</a>.</p>
<p>Only providing the weak points. Once there is one SHA1 key in the chain, I will report everything as weak.</p>
<p>Check SSL Labs for a full report, including what they actually did good (if anything).</p>
<p><span style="color: #008000;">Grade A</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.rabobank.be&amp;s=172.230.225.200" target="_blank" rel="noopener noreferrer">Rabobank</a> (<span style="color: #339966;">A+</span>): <span style="color: #339966;">no known issues</span>. Support for <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" target="_blank" rel="noopener noreferrer">HTTP Strict Transport Security</a> and prevented <a href="https://crypto.stackexchange.com/questions/10493/why-is-tls-susceptible-to-protocol-downgrade-attacks" target="_blank" rel="noopener noreferrer">downgrade attacks</a>.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.triodos.be" target="_blank" rel="noopener noreferrer">Triodos</a> (<span style="color: #339966;">A</span>): no downgrade attack prevention.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.belfius.be&amp;s=212.63.233.37" target="_blank" rel="noopener noreferrer">Belfius</a> (<span style="color: #339966;">A-</span>): weak signature (<a href="https://community.qualys.com/blogs/securitylabs/2014/09/09/sha1-deprecation-what-you-need-to-know" target="_blank" rel="noopener noreferrer">SHA1</a>), no <a href="https://en.wikipedia.org/wiki/Forward_secrecy" target="_blank" rel="noopener noreferrer">Forward Secrecy</a>.</li>
</ul>
<p><span style="color: #ff6600;">Grade B</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.axa.be" target="_blank" rel="noopener noreferrer">AXA</a>: weak signature (SHA1), <a href="https://community.qualys.com/blogs/securitylabs/2014/10/15/ssl-3-is-dead-killed-by-the-poodle-attack" target="_blank" rel="noopener noreferrer">SSL3</a> (insecure), <a href="https://community.qualys.com/blogs/securitylabs/2013/03/19/rc4-in-tls-is-broken-now-what" target="_blank" rel="noopener noreferrer">RC4</a> (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=beobank.be" target="_blank" rel="noopener noreferrer">beobank</a>: weak signature (SHA1), no TLS 1.2, RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.kbc.be">KBC</a>: weak signature (SHA1), no TLS 1.2, no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.keytradebank.be&amp;s=93.191.218.12" target="_blank" rel="noopener noreferrer">Keytrade Bank</a>: weak signature (SHA1), RC4 (insecure).</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=crelan.be&amp;latest" target="_blank" rel="noopener noreferrer">Crelan</a>: <span style="color: #33cccc;">no SSL on main page.</span>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=crelan-online.be" target="_blank" rel="noopener noreferrer">internet banking</a>: weak signature (SHA1), SSL3 (insecure), no TLS 1.2, RC4, no Forward Secrecy.</li>
</ul>
</li>
</ul>
<p><span style="color: #ff0000;">Grade C</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.hellobank.be" target="_blank" rel="noopener noreferrer">Hello bank!</a>: vulnerable to <a href="https://community.qualys.com/blogs/securitylabs/2014/10/15/ssl-3-is-dead-killed-by-the-poodle-attack" target="_blank" rel="noopener noreferrer">POODLE</a> attack, weak signature (SHA1), RC4 (insecure).</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=bankvanbreda.be&amp;latest" target="_blank" rel="noopener noreferrer">Bank Van Breda</a>: <span style="color: #33cccc;">no SSL on main page.</span>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.vanbredaonline.be" target="_blank" rel="noopener noreferrer">internet banking</a>: vulnerable to POODLE attack, weak signature (SHA1), no TLS 1.2, no Forward Secrecy.</li>
</ul>
</li>
</ul>
<p><span style="color: #ff0000;">Grade D</span></p>
<ul>
    <li>n/a</li>
</ul>
<p><span style="color: #ff0000;">Grade E</span></p>
<ul>
    <li>n/a</li>
</ul>
<p><span style="color: #ff0000;">Grade F</span></p>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.bnpparibasfortis.be&amp;s=193.58.4.82" target="_blank" rel="noopener noreferrer">BNP Paribas Fortis</a>: vulnerable to POODLE attack, SSL3 (insecure), weak signature (SHA1), RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.bpostbank.be" target="_blank" rel="noopener noreferrer">bpost bank</a>: vulnerable to POODLE attack, SSL3 (insecure), weak signature (SHA1), RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=www.ing.be&amp;s=193.58.129.66&amp;hideResults=on" target="_blank" rel="noopener noreferrer">ING</a>: vulnerable to POODLE attack, SSL3 (insecure), weak signature (SHA1), RC4 (insecure), no Forward Secrecy.</li>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=argenta.be" target="_blank" rel="noopener noreferrer">Argenta</a>: <span style="color: #33cccc;">no SSL on main page.</span>
<ul>
    <li><a href="https://www.ssllabs.com/ssltest/analyze.html?d=internetbanking.argenta.be" target="_blank" rel="noopener noreferrer">internet banking</a>: vulnerable to POODLE attack, SSL3 (insecure), weak signature (SHA1), RC4 (insecure), no Forward Secrecy.</li>
</ul>
</li>
</ul>
<p>Information about SSL Labs grading can be found <a href="https://web.archive.org/web/20170119124000/https://www.ssllabs.com/downloads/SSL_Server_Rating_Guide.pdf" target="_blank" rel="noopener noreferrer">here</a>. Grade A (+) being the best possible ranking, and F the worst.</p>
<p><span style="text-decoration: underline;">PS</span>: none of the domains support IPv6 (while expected, it would have been nice &ndash; Belgium has the <a href="https://www.google.com/intl/en/ipv6/statistics.html#tab=per-country-ipv6-adoption" target="_blank" rel="noopener noreferrer">highest IPv6 adoption rate</a> for end users, but almost no IPv6 websites or businesses).</p>
]]></content:encoded>
      <category>linux</category><category>misc</category><category>networking</category><category>software</category><category>windows</category><category>www</category>
      <category>belgium</category><category>ssl</category>
    </item>
    
    <item>
      <title>blog over ssl</title>
      <link>https://yeri.be/blog-over-ssl/</link>
      <pubDate>Fri, 18 Feb 2011 01:35:44 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/blog-over-ssl/</guid>
      <description>&lt;p&gt;Starting a SSL test on this domain as of today. Free cert by &lt;a href=&#34;https://www.startssl.com/&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;StartSSL&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;SSL is clearly the new hype, and this time I won&amp;rsquo;t be last to join it! ;)&lt;/p&gt;&#xA;&lt;p&gt;Just going to check how much (if any) SSL slows down my site.&lt;/p&gt;&#xA;&lt;p&gt;Every &lt;a href=&#34;https://yeri.be&#34;&gt;http&lt;/a&gt; requests gets automatically rewritten to &lt;a href=&#34;https://yeri.be&#34;&gt;https&lt;/a&gt;.&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>Starting a SSL test on this domain as of today. Free cert by <a href="https://www.startssl.com/" target="_blank" rel="noopener noreferrer">StartSSL</a>.</p>
<p>SSL is clearly the new hype, and this time I won&rsquo;t be last to join it! ;)</p>
<p>Just going to check how much (if any) SSL slows down my site.</p>
<p>Every <a href="https://yeri.be">http</a> requests gets automatically rewritten to <a href="https://yeri.be">https</a>.</p>
]]></content:encoded>
      <category>misc</category><category>networking</category><category>www</category>
      <category>tuinslak</category><category>blog</category><category>https</category><category>ssl</category>
    </item>
    
  </channel>
</rss>
