Filter by Category

What GoAnywhere Customers Should Know About LogJam

Logjam"LogJam Computer Bug Could Wreak Havoc" - USA Today

"A Frightening New Vulnerability Could Let Hackers Bypass The One Thing That Keeps Us Safe Online" - Business Insider

"FREAK-like LogJam Attack Undermines TLS Security" Infosecurity Magazine

"Enterprise, Cloud Services Exposed as Vulnerable to LogJam" - ZDnet

With frightening headlines appearing last week in various news outlets around the world, it's no wonder people are paying attention to the Diffie-Hellman key exchange attack also known as LogJam. The extremely popular Diffie-Hellman key exchange algorithm allows Internet protocols to negotiate secure connections using shared keys and is integral to protocols such as HTTPS, SMTPS, IPsec and those reliant on TLS.  LogJam exploits a flaw that could allow eavesdropping and data manipulation on affected HTTPS websites.

GoAnywhere Not Vulnerable to LogJam Attack on SSL/TLS. GoAnywhere Services relies on the JSSE provider for handling SSL/TLS handshake operations. If configured properly, GoAnywhere is not vulnerable to the SSL/TLS Diffie Hellman key exchange attack known as LogJam.

To avoid this attack in GoAnywhere, configure your HTTPS/AS2, FTP, and FTPS Services to only enable cipher suites that utilize the Elliptic Curve DH key exchange algorithms.

For any GoAnywhere customers who have concerns or need assistance in ensuring their system is configured properly, our dedicated Support Team is always available to help. There are several convenient ways to connect with us. You can learn more on our Customer Support page at GoAnywhere.com.

 

Add a Comment

Allowed tags: <b><i><br>

Latest Posts


Why You Should Never Use FTP to Transfer Cloud Files

March 7, 2019

The cloud has become an increasingly popular topic among organizations in recent years. From sharing projects via cloud collaboration tools to exchanging files between a company and its trading…


Public Defender’s Office Reduces Manual Data Entry with Secure File Transfer Software

March 4, 2019

Every organization has legacy processes. Manual data entry, file cabinets full of paper records, sensitive documents sent across the organization by email, or even file transfers sent via homegrown…


Five Secure File Transfer Alternatives to FTP

February 21, 2019

The Need for Secure File Transfer Protocols Back in the day, File Transfer Protocol (FTP) was the go-to protocol for sending files. It was a simpler time, and security was far less of an issue than…


Which is Better: Free SFTP Software vs. Enterprise-Level SFTP Software?

February 14, 2019

Free SFTP Software vs. Enterprise-Level SFTP Software In general, people like free things. Beverages, company lunches, swag at tradeshows and conferences, t-shirts and socks, those intriguing items…


What is Secure File Transfer?

February 5, 2019

Moving sensitive, often-proprietary files from one person—or organization—to another has become a complex aspect of the business world today. This complexity comes not only from the size…