Bug ID: 73644
Summary: Payment processor website uses RC4 for https
Web browser: ---
Mobile Platform: ---
When trying to make a donation, after entering the amount I wanted to donate I
was redirected to a server, ott9.wpstn.com.
From what I can tell, it's a WorldPay.ca (payment processor) server.
Having configured Firefox to refuse all connections using the RC4 cipher for
SSL/TLS (as RC4 is deprecated and considered insecure), I was not able to
establish a connection to the server (Firefox shows the “no cipher overlap”
An SSL test for the domain shows that it indeed offers RC4 (and nothing else):
This is bad. RC4-encrypted traffic has been likened by some infosec researchers
to “no encryption” and the NSA can allegedly break it in real-time.
Here is the (very poor) list of ciphers offered by the server:
TLS_RSA_WITH_RC4_128_MD5 (0x4) 128
TLS_RSA_WITH_RC4_128_SHA (0x5) 128
TLS_ECDHE_RSA_WITH_RC4_128_SHA (0xc011) ECDH 571 bits (eq. 15360 bits RSA)
Furthermore, the server is still offering SSLv3. That should also be disabled,
following the POODLE vulnerability published about a month ago.
The server should be offering modern encryption (forward secrecy, no SSL,
strong non-deprecated ciphers).
Here is a good guide on how to do it on Apache2:
I hope this can be resolved quickly as the Wikipedia fundraising campaign is
ongoing and I don't feel comfortable giving in such conditions nor recommending
others do so, even if I believe it is really important they do support
Wikipedia, when the payment processor's security is in such a sad state.
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.
Wikibugs-l mailing list