Image

Depth of Access
LogJam is actually two vulnerabilities rolled into one. First, there's the ability to force a connection to use weaker encryption, and secondly, there's the ability to greatly decrease the time required to crack an encrypted connection by doing some work ahead of time (precomputation). Again, if you want the technical details, there are lots of resources [pdf] and discussions, but the end result is that these two conditions individually allow for an encrypted connection to be compromised, and together, make it feasible for an attacker to actually do so in real-world scenarios. The real world consequence of exploit is a compromise of confidentiality; a successful attacker can read the traffic for your encrypted connection. There's also the opportunity to compromise integrity by modifying the contents of a connection and passing the results along, but doing so in real-time, without substantial delay in the connection presents additional challenges.Exploit Requirements
LogJam uses a man-in-the-middle (MITM) attack, meaning that there are three parties involved in the attack scenario. Let's call them Alice, Bob and James. Alice and Bob want to exchange some information in a confidential way, not surprisingly, but they're using a connection that's vulnerable to LogJam. James would like to capture all the data from that exchange. In order to successfully do so, James requires a few things:- The ability to capture and send packets for the connection, e.g. an inline device or device on the same network
- Computational resources to compromise the initial key exchange, i.e. the precomputation
Attacker Profile
Understanding the way the attack works helps us model a profile of likely attackers. I can't help but mentally model this process around a search metaphor—as you add parameters, you narrow the results. In this case, the attacker must have selected a target, have the ability to actually man-in-the-middle their connection at some point (or all the time), and have the computational resources necessary. The computational resources part is that final parameter that narrows the results substantially. It’s really about cost, either paying for the compute cycles somewhere, or running them yourself. Regardless, there has to be something of sufficient value at the end to justify it. Who might be able to reasonably apply such resources to this problem? You might find the raw resources at a large company, university or government. It would be hard, though not impossible, to use them without some disclosure at a for-profit company or university. The reality is that nation-state actors are the most capable of undertaking this type of attack. While very possible to execute, this isn't an inexpensive endeavor.Likely Targets?
The end result of this blogalysis is a picture of what a likely target might look like. If we've narrowed the field of probable attackers to nation-states, then the targets are going to be those individuals or organizations that have desirable data for adversary nation-states to acquire or modify. You might think that's a small group, but it's more expansive than you'd guess. You can start with basically any government of significance, i.e. all the potential threat actors are also likely targets. Then you can add any economic power, since money is essentially a munition at this level. This paints a pretty compelling picture for large scale … uh … LogJammin'.Image
