Author

Topic: All SSL Certificates can be spoofed: TURKTRUST (Read 1341 times)

sr. member
Activity: 472
Merit: 250
Never spend your money before you have it.
February 23, 2013, 08:33:55 PM
#12
And what's the deal with bitcoin.org and the armory site where people getting their bitcoin software from are not using any security/encryption at all to protect the transfer?
Any MITM could interfere to send a malware program instead of the real ones, to steal all the unsuspecting downloader's coin (potentially millions).
Is there any discussion of this lack of security in the heart of BTC?
legendary
Activity: 2576
Merit: 2267
1RichyTrEwPYjZSeAYxeiFBNnKC9UjC5k
The only correct way to do such security is to receive the certificate fingerprint directly from the party or have someone you trust provide it to you.

This is kind-of the way it is done with the CA system except you are trusting the CAs because the browser providers put some default providers in there because... Well, do you know why? Do you know what requirements the browser providers make of the CAs to warrant them giving them your trust by proxy?

The truth is that it's a pretty shoddy system and definitely a result of convenience over security. I still use it because risks are low and I don't consider other options to be realistically worth the hassle. So convenience over security for me too but I'm doing it by choice. There are many (most) people out there who are unaware of the implications.
full member
Activity: 154
Merit: 100
1) So a phishing site could have an ssl cert that appears to be Paypal.com (for example), is that a 'practical' use of this info?

That's one concern, but the main concern is that your ISP or someone else between you and PayPal on the network could intercept your PayPal password.

I am sure some one (maybe some government) will do that.
administrator
Activity: 5222
Merit: 13032
1) So a phishing site could have an ssl cert that appears to be Paypal.com (for example), is that a 'practical' use of this info?

That's one concern, but the main concern is that your ISP or someone else between you and PayPal on the network could intercept your PayPal password.
legendary
Activity: 2114
Merit: 1040
A Great Time to Start Something!
1) So a phishing site could have an ssl cert that appears to be Paypal.com (for example), is that a 'practical' use of this info?

2) DNS has been mentioned: If my DNS is secure then people land at the correct site and see my genuine cert. I'm more concerned that the move to TLS1.1 never happened, TLS1.0 is hackable.
full member
Activity: 154
Merit: 100
The CA system is garbage. I use Certificate Patrol and Perspectives to protect against this kind of thing. I wish I could disable all CAs, but Firefox is bad at handling this.

My favorite idea for replacing the CA system is to put certificates in DNSSEC-protected DNS records. Then only people you have agreements with can screw you: your registrar, register, and ICANN.

In this way, CA may not be better than manually confirm each certificate yourself (except maybe first time visit a website and use CA to match the name you want to visit)

Anyway, i never realized this before.
legendary
Activity: 1400
Merit: 1013
When I brought this up in the payment protocol thread why was I shouted down for this being a purely theoretical problem?
administrator
Activity: 5222
Merit: 13032
The CA system is garbage. I use Certificate Patrol and Perspectives to protect against this kind of thing. I wish I could disable all CAs, but Firefox is bad at handling this.

My favorite idea for replacing the CA system is to put certificates in DNSSEC-protected DNS records. Then only people you have agreements with can screw you: your registrar, register, and ICANN.
full member
Activity: 140
Merit: 100
1221iZanNi5igK7oAA7AWmYjpsyjsRbLLZ
There are thousands of SSL certificate authorities.

Any of them can issue a valid SSL certificate for any website.

So the current trust system is a single point of failure, yes. Any of the certificate authorities can make a certificate for any website.
full member
Activity: 154
Merit: 100
So if I understand it right, a single point of failure of the current certificate authority structure can make anyone impersonate anyone else ?
full member
Activity: 140
Merit: 100
1221iZanNi5igK7oAA7AWmYjpsyjsRbLLZ
Here's my (poor) attempt to explain what this is all about:

There are fake google.com SSL certificates being used to steal passwords and break into accounts.

Microsoft Security Advisory 2798897: Fraudulent Digital Certificates Could Allow Spoofing

This will probably cause the centralized authority to take further action to restrict the freedom of the net. Proposals like TLSA / CAA put too much power in the hands of the DNS registrars.

This is not the first time the CA trust system for all SSL certificates has been broken wide open. This talk from 28C3 describes another bad one.

Namecoin, despite its weaknesses, might just have a chance!
full member
Activity: 140
Merit: 100
1221iZanNi5igK7oAA7AWmYjpsyjsRbLLZ
Brian Krebs, former Washington Post reporter, now a recognized blogger in computer security reports:

Turkish Registrar Enabled Phishers to Spoof Google

Turkish government agency spoofed Google certificate "accidentally"

Note that the fake intermediate CA files have been in the wild for 5 months! The ability to impersonate any SSL server is worth in excess of $25,000 on the black market.
Jump to: