TURKTRUST Incident Raises Renewed Questions About CA System | threatpost
Posted by jpluimers on 2013/01/05
A small quote from the very interesting TURKTRUST Incident Raises Renewed Questions About CA System | threatpost article:
“Subordinate certificates have long been identified as a point of weakness in the CA system. They are typically granted unconstrained power to issue certificates for any domain name. Thus, a leak of one subordinate certificate is seen as equivalent to a leak of authority equivalent to all CAs combined. Worse, subordinate certificates need not be explicitly trusted by the software that authenticates encrypted SSL connections typically your web browser. They inherit their trust from the explicitly trusted CAs that have been vetted by your browser vendor,” Steve Schultze, associate director of the Center for Information Technology Policy at Princeton University, wrote in an analysis of the TURKTRUST incident.
A CA (Certificate Authority) issues certificates, most of which are used for domain validation by web-browsers, email and applications. This allows you to make sure when you communicate with your bank (through a web browser or banking app on your phone) to verify the server of the bank is in fact the server of your bank. Or your email program really talks to the server of your email provider and not some intermediate that spoofs your mails.
If fraudulent certificates get issued for certain domains (sometimes specific like http://www.google.com, sometimes generic like *.yahoo.com, or *.*.com), then you cannot trust those domains any more, nor your communication with them. So communication with your bank could be intercepted and changed, thereby loosing money.
That’s exactly what happened in 2011 and late 2012:
- In March 2011, fraudulent certificates where issued by the Comodo CA (for Google.com, Yahoo.com, Skype.com and others).
- In August 2011, the DigitNotar CA was completely compromised, so fake certificates for any domains could have been issued.
Comodo and DigiNotar were hacked by the same person, and he claimed to have hacked even more CAs. - This week, it was revealed that – due to a mistake – the TURKTRUST CA issued some intermediate CA certificates that should have been regular ones.
The heart of the problem is twofold:
- if a CA somehow (by mistake, hacking or whatever) issues a rogue certificate, it takes a relatively long time to find out it is rogue. In the mean time, everyone trust the rogue certificate, and a lot of damage can be done.
- it takes a relatively long time for people to patch their systems making the window of opportunity even bigger (heck, I regularly see systems that have not been patched for months or years).
While a IETF proposal to log all intermediate and end-entity certificates tries to fix 1., make sure you fix 2. by keeping your systems patched.
–jeroen
via TURKTRUST Incident Raises Renewed Questions About CA System | threatpost.
Rate this:
Share this:
- Click to share on Mastodon (Opens in new window) Mastodon
- Click to share on Bluesky (Opens in new window) Bluesky
- Share on Tumblr
- Click to share on Reddit (Opens in new window) Reddit
- Click to share on Threads (Opens in new window) Threads
- Tweet
- Click to share on Telegram (Opens in new window) Telegram
- Click to share on Nextdoor (Opens in new window) Nextdoor
- Click to share on WhatsApp (Opens in new window) WhatsApp
- Click to print (Opens in new window) Print
- Click to email a link to a friend (Opens in new window) Email
Related
This entry was posted on 2013/01/05 at 11:55 and is filed under Opinions. Tagged: browser vendor, ca certificate, ca certificates, certificate authority, domain validation, email provider, fake certificates, google, internet, software, ssl connections, technology, web browsers. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
This site uses Akismet to reduce spam. Learn how your comment data is processed.






Leave a comment