Do you really want “bank grade” security in your SSL? Here’s how Aussie banks fare

Discussion in 'News Aggregator' started by Troy Hunt, 4 May 2015.

  1. Troy Hunt

    Troy Hunt Guest

    There was a bit of discussion down here recently about how the National Australia Bank (NAB) has requested their SSL stats be withheld from showing up in the SSL Labs test that which has become so popular in recent times. It’s a great way of identifying what’s good and what bad about an SSL implementation and indeed, it appears that NAB has pulled their stats:

    [​IMG]

    Which, of course, looks enormously suspicious. You don’t pull your stats when you have a good result and even if you do, Qualys who runs the service is only checking for publicly accessible information anyway, they’re simply bundling it up into a single test that’s dead easy to run.

    But it did get me wondering – how do our local banks actually stack up? Is their SSL solid? And for that matter, is the old adage of “bank grade” security actually something you want to strive for or in the case of SSL, something you really don’t want?


    I was genuinely curious so I checked them against the most important attributes Qualys tests for. Here’s how the locals stack up:

    Bank Grade
    Still supports SSL 3

    Still supports SHA1

    No TLS 1.2 support

    Still supports RC4

    No forward secrecy support

    Vulnerable to POODLE
    Bank West A *
    IMB A
    Heritage A- *
    ING Direct A-
    Westpac A-
    ANZ B
    bankmecu B
    Bendigo Bank B
    Beyond B
    Commonwealth Bank B
    CUA B
    Newcastle Permanent B
    P&N B
    People's Choice Credit Union B
    St George B
    Suncorp B *
    Teachers Mutual B
    Greater C
    AMP F *
    Bank of Queensland F
    Macquarie F *

    * Intermediate cert still supports SHA1

    So we’ve got two banks that actually gets an A grade and kudos to Bank West and IMB for that. They’re the only ones presently supporting forward secrecy – every single other bank is presently missing this… except for Greater which fares quite poorly for other reasons. Heritage, ING Direct and Westpac are the only ones that failed in this area alone, the others are the really worrying ones…

    The twelve B grades obviously vary in where they fall down. Most still support RC4 after which there’s a mixed bag of ongoing SSL3 and SHA1 support plus a lack of TLS 1.2 support. All the major browsers have supported 1.2 since early last year so it’s a mystery why so many of them can’t support it in their banking services.

    You don’t often see C grades, but Greater manages it due to their POODLE risk. They’re a real odd one actually as they actually support forward secrecy which is unusual in this bunch, so why they’re still supporting SSL 3 is a mystery.

    The worrying ones, of course, are those that are still at risk of the PODDLE vulnerability. You don’t expect to see this in any website these days, let alone one handling your money. Yes yes, banks have all sorts of other mechanisms in place to mitigate risks but it’s a not a good look when your customer-facing website is at risk of such a well-publicised risk.

    So in short, no, “bank grade” is not a virtue when it comes to your SSL implementation. Frankly, it’s disappointing to see them faring so bad regardless of what other downstream protection mechanisms they have. By now, good transport layer security should be the norm for anyone protecting sensitive information but it looks like we still have a way to go in the banking sector down here.

    [​IMG]

    Continue reading...
     

Share This Page

Loading...