<iframe src="//www.googletagmanager.com/ns.html?id=GTM-MRFNVD" height="0" width="0" style="display:none;visibility:hidden">

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Soha Blog

Soha Systems Customers Not Vulnerable to the LogJam Attack

[fa icon="calendar"] May 22, 2015 5:07:32 PM / by Rupinder Gill

The recently released LogJam Attack is essentially a man-in-the-middle attack that can be used to downgrade vulnerable TLS connections to use weak cryptography. This attack essentially exploits support of export-grade ciphersuites similar to the FREAK attack released in March 2015.

Soha Systems customers are NOT vulnerable to this issue, as we don’t support or use export-grade cryptography on any of our systems.

LogJam and FREAK family of attacks are essentially side effects of US export policy in 90s that only permitted weak cryptography to be exported out of US. Today, export-grade ciphersuites are never directly used for securing a connection. However, servers or clients that support these weak ciphersuites can be exploited by tricking them to downgrade connections to use these weak ciphersuites. It is considered best practice to disable export-grade cryptography in security sensitive deployments.

Topics: Blog

Rupinder Gill

Written by Rupinder Gill