Difference between revisions of "P-W-U:CA Article"
(Created page with "Secure Sockets Layer (SSL) is the protocol suite that underpins many security implementations, providing encryption between anything from customers and their financial institu...") |
|||
Line 1: | Line 1: | ||
Secure Sockets Layer (SSL) is the protocol suite that underpins many security implementations, providing encryption between anything from customers and their financial institutions, to employees and their employer's secured systems containing trade secrets and process or even simple things as checking email. SSL provides protection against MiTM (Man in The Middle) attacks to prevent eavesdropping. | Secure Sockets Layer (SSL) is the protocol suite that underpins many security implementations, providing encryption between anything from customers and their financial institutions, to employees and their employer's secured systems containing trade secrets and process or even simple things as checking email. SSL provides protection against MiTM (Man in The Middle) attacks to prevent eavesdropping. | ||
− | However when it comes to some implementations of SSL (say that of which is on your web browser or email client), there is currently a weakness, the Certificate Authority (CA) system. Certificate Authorities are the trusted ("trust" is a key word here) organizations that cryptographically sign certificates for internet services for identity verification. This is done by each CA having a private key and a public key. A service operator (say a web site owner) submits a certificate signing request to the CA and the CA signs it with their private key and is verifiable with their public key (which is installed into browsers/operating systems). | + | However when it comes to some implementations of SSL (say that of which is on your web browser or email client), there is currently a weakness, the Certificate Authority (CA) system. Certificate Authorities are the trusted ("trust" is a key word here) organizations that cryptographically sign certificates for internet services for identity verification (that green bar with the lock you see on your browser). This is done by each CA having a private key and a public key. A service operator (say a web site owner) submits a certificate signing request to the CA and the CA signs it with their private key and is verifiable with their public key (which is installed into browsers/operating systems). |
Now, the CA system induces a weakness because it depends too heavily upon a third party (again, the CAs) to be trustworthy and to have adequate controls on their internal signing systems and not to be subjected to adversaries. There has been many occasions to date where these CA systems have been broken into and have had their signing systems compromised, even high-profile industry names. The difficulty is that if enough trust a CA or if a CA has large enough clientele that they can never have their technological trust (that is the root certificates installed into operating systems and browsers) pulled even though socially in the information security industry their trust has ended. This leads to situations where CAs can become "Too big to fail". | Now, the CA system induces a weakness because it depends too heavily upon a third party (again, the CAs) to be trustworthy and to have adequate controls on their internal signing systems and not to be subjected to adversaries. There has been many occasions to date where these CA systems have been broken into and have had their signing systems compromised, even high-profile industry names. The difficulty is that if enough trust a CA or if a CA has large enough clientele that they can never have their technological trust (that is the root certificates installed into operating systems and browsers) pulled even though socially in the information security industry their trust has ended. This leads to situations where CAs can become "Too big to fail". | ||
+ | |||
+ | Now, one may think "I can just have a CA sign for my domain and nobody else can forge". Not true. The CA system is not like the domain name system (DNS) where names are unique and there is a defined hierachy. Within the CA system, two CAs can have both seperate certificates for the same domain that are equally verifiable as correct. Which this has indeed happened with high profile sites like Google, Yahoo, Wordpress and many other domains in the DigiNotar incident (10 July 2011) where Iranian users had their traffic compromised and were fooled by the malicious DigiNotar-issued certificates despite other certificates already existing. | ||
+ | |||
+ | Comodo's CA division has a similar incident (March 31 2011) where an alleged state-sponsored attack was performed against it where an attacker attempted to obtain signed certificates for many communications-related sites, again to perform a MiTM the users' traffic. | ||
+ | |||
+ | There is no telling in today's world where authoratative trust is becoming harder and harder when said authorities can be coersed or otherwise compromised criminally (for whatever cause). The difficulty is that many of these trust mechanisms are embedded so far into various technological mechanisms it will be many years before alternatives even make PoC (Proof of Concept) demonstration to interested development audiences for prompt deployment of new suites. It is therefore our opinion that SSL is broken and weakened until then. |
Revision as of 00:29, 20 October 2013
Secure Sockets Layer (SSL) is the protocol suite that underpins many security implementations, providing encryption between anything from customers and their financial institutions, to employees and their employer's secured systems containing trade secrets and process or even simple things as checking email. SSL provides protection against MiTM (Man in The Middle) attacks to prevent eavesdropping.
However when it comes to some implementations of SSL (say that of which is on your web browser or email client), there is currently a weakness, the Certificate Authority (CA) system. Certificate Authorities are the trusted ("trust" is a key word here) organizations that cryptographically sign certificates for internet services for identity verification (that green bar with the lock you see on your browser). This is done by each CA having a private key and a public key. A service operator (say a web site owner) submits a certificate signing request to the CA and the CA signs it with their private key and is verifiable with their public key (which is installed into browsers/operating systems).
Now, the CA system induces a weakness because it depends too heavily upon a third party (again, the CAs) to be trustworthy and to have adequate controls on their internal signing systems and not to be subjected to adversaries. There has been many occasions to date where these CA systems have been broken into and have had their signing systems compromised, even high-profile industry names. The difficulty is that if enough trust a CA or if a CA has large enough clientele that they can never have their technological trust (that is the root certificates installed into operating systems and browsers) pulled even though socially in the information security industry their trust has ended. This leads to situations where CAs can become "Too big to fail".
Now, one may think "I can just have a CA sign for my domain and nobody else can forge". Not true. The CA system is not like the domain name system (DNS) where names are unique and there is a defined hierachy. Within the CA system, two CAs can have both seperate certificates for the same domain that are equally verifiable as correct. Which this has indeed happened with high profile sites like Google, Yahoo, Wordpress and many other domains in the DigiNotar incident (10 July 2011) where Iranian users had their traffic compromised and were fooled by the malicious DigiNotar-issued certificates despite other certificates already existing.
Comodo's CA division has a similar incident (March 31 2011) where an alleged state-sponsored attack was performed against it where an attacker attempted to obtain signed certificates for many communications-related sites, again to perform a MiTM the users' traffic.
There is no telling in today's world where authoratative trust is becoming harder and harder when said authorities can be coersed or otherwise compromised criminally (for whatever cause). The difficulty is that many of these trust mechanisms are embedded so far into various technological mechanisms it will be many years before alternatives even make PoC (Proof of Concept) demonstration to interested development audiences for prompt deployment of new suites. It is therefore our opinion that SSL is broken and weakened until then.