NNSquad - Network Neutrality Squad
[ NNSquad ] Re: Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL
On Jan 31, 2011, at 7:45 PM, Lauren Weinstein wrote: > > Certified Lies: Detecting and Defeating Government Interception > Attacks Against SSL > > http://bit.ly/fdA1Nb (Cryptogon) Yup... Compromised, accidental, tricked, malicious and compelled CAs are included in the things that the DANE (nee KIDNS nee KeyAssure) IETF WG is working to address ( charter here: https://datatracker.ietf.org/wg/dane/charter/ ) The very very high level overview is that an end user generates their own (self-signed) certificate, or gets a CA issues cert, and publishes a means of identifying that certificate in the DNS, signed with DNSSEC. When a relying party comes to use the certificate, they perform DNSSEC validation to ensure that the certificate they have received is the one intended. If their has been some malfeasance either the certificate fingerprint will not match, or the DNSSEC validation will fail... [ Description horribly oversimplified ] W [ Of course, currently most browsers make using self-signed certs a royal pain -- by doing everything possible to scare users into not accepting them. I've addressed this a number of times, including in: Firefox 3's Step Backwards For Self-Signed Certificates http://bit.ly/b4LgFc (Lauren's Blog) Firefox makes you click through a bunch of alarming hoops to accept an SS cert, but ultimately allows you to save it for future use. Chrome also puts up an alarming message, but allows to accept the cert with a single click. However, it provides no simple mechanism to save that cert for the future. I am, as you might imagine, not enthusiastic about adding additional functionality to DNS, given that I really am very much dedicated to helping DNS ultimately wither away, through the deployment of alternative name/address mechanisms, such as IDONS. -- Lauren Weinstein NNSquad Moderator ] > > "This paper introduces the compelled certificate creation attack, in > which government agencies may compel a certificate authority to issue > false SSL certificates that can be used by intelligence agencies to > covertly intercept and hijack individuals' secure Web-based > communications. Although we do not have direct evidence that this form > of active surveillance is taking place in the wild, we show how > products already on the market are geared and marketed towards this > kind of use-suggesting such attacks may occur in the future, if they > are not already occurring. Finally, we introduce a lightweight browser > add-on that detects and thwarts such attacks." > > --Lauren-- > Lauren Weinstein (lauren@vortex.com): http://www.vortex.com/lauren > Co-Founder: People For Internet Responsibility: http://www.pfir.org > Founder: > - Network Neutrality Squad: http://www.nnsquad.org > - Global Coalition for Transparent Internet Performance: http://www.gctip.org > - PRIVACY Forum: http://www.vortex.com > Member: ACM Committee on Computers and Public Policy > Blog: http://lauren.vortex.com > Twitter: https://twitter.com/laurenweinstein > Google Buzz: http://bit.ly/lauren-buzz > Quora: http://www.quora.com/Lauren-Weinstein > Tel: +1 (818) 225-2800 / Skype: vortex.com > >