Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

Perfect MITM Attacks With No-Check SSL Certs 300

StartCom writes "In a previous article I reported about Man-In-The-Middle attacks and spotlighted an example showing that they really happen. MITM attacks just got easier. In the attack described previously, untrusted certificates from an unknown issuer were used. Want to make the attack perfect with no error and a fully trusted certificate? No problem, just head over to one of Comodo's resellers. Screenshots and disclosure provided at the link."
This discussion has been archived. No new comments can be posted.

Perfect MITM Attacks With No-Check SSL Certs

Comments Filter:
  • by mlwmohawk ( 801821 ) on Tuesday December 23, 2008 @09:24AM (#26210691)

    I never liked the notion of "trusted" certs. I have always built my own certs. While I can't read the article, I would say it is an obvious vulnerability in host naming.

    SSL/TLS is mathematically secure. I mean, yes, it really is. You can trust that aspect of it. It breaks down in practice where secrets need to be kept secret or in areas where strict adherence to good practices are vital but not done.

  • by Anonymous Coward on Tuesday December 23, 2008 @09:25AM (#26210697)

    source of the slashdotted page :

    ----
    In a previous article I reported about Man-In-The-Middle (MITM) attacks and if they really happen. Unfortunately it does happen as some testimonials confirm. Now itâ(TM)s even easier because in the attack described previously, untrusted certificates from an unknown issuer were used. Want to make the attack perfect with no error and fully trusted certificate? No problem, just head over to one of Comodoâ(TM)s resellers.

    In an unrelated event which was briefly mentioned at the dev.tech.crypto mailing list of Mozilla, something strange happened. During my attempt to verify and understand who stands behind the sending of fraudulent âoereminderâ email messages tricking our customers, I created a certificate from the source I was following. And my certificate was issued without any further questions.

    This prompted me to create another certificate through them, but this time by using a domain name which should never be issued to me. For the purpose of testing, I selected the domain mozilla.com (Iâ(TM)m certain they will forgive me). Five minutes later I was in the possession of a legitimate certificate issued to mozilla.com - no questions asked - no verification checks done - no control validation - no subscriber agreement presented, nothing.

    With the understanding about MITM attacks, the severity of this practice is obvious. No encryption is worth anything if an attacker can implant himself between the client and the server. With a completely legitimate and trusted certificate, the attack is perfect. No warning and no error.

    --
    there you go, have a nice xmas and slashdot less

  • Re:nothing new (Score:2, Informative)

    by neumayr ( 819083 ) on Tuesday December 23, 2008 @09:36AM (#26210787)
    The author's point was that he could get a signed cert the says mozilla.org.
    Should have tried paypal.com, but I guess he didn't want too much legal trouble.
  • Another reference (Score:4, Informative)

    by Slite01 ( 1020539 ) on Tuesday December 23, 2008 @09:50AM (#26210869)
    While the original blog is slashdotted, please enjoy this link to Google Groups: http://groups.google.com/group/mozilla.dev.tech.crypto/browse_thread/thread/9c0cc829204487bf?pli=1 [google.com]
  • by bunratty ( 545641 ) on Tuesday December 23, 2008 @10:22AM (#26211147)
    Microsoft maintains the list for IE. Mozilla maintains the list for Firefox. And so on. Use a browser from a company you can trust, or you may just regret it one day.
  • by iammani ( 1392285 ) on Tuesday December 23, 2008 @10:34AM (#26211253)

    Folks who are surprised should definitely check out the list of Certificate Authorities. In Firefox Prefences -> Advanced -> Encryption -> View Certificates -> Authorities Tab

    The first one is TÃoeRKTRUST Elektronik Sertifika HizmetSaÄYlayıcısı.

    And its much worse in IE -- Internet Option-> Certificates -> Trusted Root Cert. Autho. I have not heard of 25% of the Authorities.

    As the wise put it, security is only as strong as the weakest link.

  • by Nursie ( 632944 ) on Tuesday December 23, 2008 @10:37AM (#26211283)

    Unless you've already decided that you don't trust Comodo, for this reason, and have struck them from your list of trusted authorities.

  • by Actually, I do RTFA ( 1058596 ) on Tuesday December 23, 2008 @11:26AM (#26211737)

    As it is, I don't think anyone would be liable (except yourself) to pick up the cost of shenanigans

    It depends on the country. Two friends of mine were mugged, and their wallets stolen. The one with a US credit card made a call, got the charges reversed, and a new card in the mail. No pain. My other friend from South America was on the hook for the thousands of USD that the crooks rang up, and couldn't even cancel it until the next morning.

  • by Anonymous Coward on Tuesday December 23, 2008 @12:56PM (#26212805)

    SSL is not supposed to be preventing MITM nor is it supposed to be for identifying purposes.

    No. SSL is designed specifically to permit identification of both parties (not that any uses client side certs), with the aim of preventing MITM attacks. This is one if its intentional design goals and it's why we have certificates at all. PGP has exactly the same problems that SSL does with chain of trust and verification of public keys. For any trust system that's used on a large scale (like SSL is, and PGP isn't) you *must* have automatic verification of trust and you must "trust" some sort of authority - peer to peer isn't going to cut it.

  • by Animats ( 122034 ) on Tuesday December 23, 2008 @01:11PM (#26213001) Homepage

    The article is confusing, and the author declines to name the certificate issuer that's the problem. But the screenshot [startcom.org] gives the details. It's PositiveSSL [positivessl.com]. He really did get PositiveSSL to issue him a Comodo-authorized cert in the name of "www.mozilla.com". Try this link [192.116.242.23] and look at the certificate details.

    It looks like certificates with this issuer information need to be rejected:

    • CN = PositiveSSL CA
    • O = Comodo CA Limited
    • L = Salford
    • ST = Greater Manchester
    • C = GB

    I loaded all current Comodo certificate revocation lists, and this bogus certificate has not been revoked.

    Some Comodo CA root certificate needs to be removed from the approved list.

  • by agwadude ( 666995 ) on Tuesday December 23, 2008 @01:14PM (#26213047)

    SSL is not supposed to be preventing MITM nor is it supposed to be for identifying purposes.

    I disagree. Why else does SSL have certificate signing capabilities? SSL even has client-side certificates for client identification, though it isn't widely used in HTTPS. In order for any asymmetric cryptosystem to work you need to exchange public keys, and you always have to establish some kind of trust system for those keys.

    We have other technologies for that like PGP but the internet relies on anonymity so you're never 100% sure that you're going to talk to the correct persons.

    Hence the need for SSL.

    Even with PGP, your initial communications will have to be trusted (eg. you personally hand over or get a key) or any subsequent communications will be compromised. SSL doesn't even go that far because every communication is viewed as an initial communication. If the certificate is re-signed or changed to another CA the next day, your browser will not complain as long as that CA is in it's trusted root certificates.

    This is a fault of how the key management in SSL has been implemented in web browsers, but says nothing about the technology itself. Two examples of systems using SSL with better (but less convenient) key management systems are OpenSSH and OpenVPN.

    It's the browsers fault and the CA's as well (with VeriSign the biggest) by asserting that SSL certificates can be used to authenticate an entity rather than a communications.

    There's a middle ground between "entity" and "communications." Yes, it is very difficult to verify that a certificate is being issued to the entity "Bank of America," but it should not be hard to verify that you're issuing a certificate to the domain name www.bankofamerica.com. And the latter is all you need to protect against MITM.

  • by c_g_hills ( 110430 ) <chaz AT chaz6 DOT com> on Tuesday December 23, 2008 @01:15PM (#26213061) Homepage Journal
    Update: a bug [mozilla.org] has been opened to handle this incident. It seems the offending company was spamming, and nowhere did they state that they were a reseller for Comodo, nor were there any ownership checks done before issuing the certificate.
  • by Animats ( 122034 ) on Tuesday December 23, 2008 @01:46PM (#26213495) Homepage

    Looking at this cert further, it's a very wierd certificate. "Issuer" of ""www.mozilla.com" has "O=Comodo CA Limited". That's descended from "Positive SSL CA", for which "Issuer" has "O = The USERTRUST Network". That's descended from "UTN-USERFirst-Hardware", for which Issuer has "O = AddTrust AB". That's descended from "AddTrust External CA Root". Why is a Comodo cert being issued under AddTrust? Comodo is a root CA itself, with its own root certs in major browsers. Something is not right here.

    So who's AddTrust [addtrust.com]? Their web site says "Under Reconstruction". This does not look good. Checking the Internet Archive, we find "JOIN THE ADDTRUST FAMILY Gain an edge over your competitors by providing co-branded PKI services" [archive.org]

    AddTrust went beyond using resellers. They apparently allowed subordinate CAs to issue certs in AddTrust's name: AddTrust's rapid Trust Service Provider (Licensee) start-up package allows you to deliver cutting-edge public key infrastructure (PKI) services cost-effectively and in a way that best complements your business model. Literally within months you can start selling pre-packaged outsourced PKI services allowing your customers ... AddTrust's globally recognized PKI brand is designed for co-branding with companies recognized for high-quality IT services and products. ... Rather than relying on external certification authorities, you can easily provide high-end certificates yourself by becoming an AddTrust-licensed Trust Service Provider. This allows you to decide how much of the underlying secure infrastructure you want to run and invest in yourself.

    The relationship between Comodo and AddTrust is mentioned in this email. [markmail.org] Robin Aldin of Comodo wrote: There is no ongoing relationship with AddTrust AB, Sweden. I'm not even sure if AddTrust AB still exists as a company. I think AddTrust may exist now only as a brand of ScandTrust AB. Sweden - although Comodo does have the right to continue using the root CA certificates which we purchased from them and which bear the AddTrust name.

    So the party ultimately responsible for this certificate is out of business?

  • by Animats ( 122034 ) on Tuesday December 23, 2008 @02:10PM (#26213821) Homepage

    This subject is being discussed by Firefox developers, Comodo CA people, the person who reported the problem, and somebody named "Patricia" from CertStar, the issuer, here. [markmail.org]

    Robert Alden of Comodo says they "have suspended Certstar's reseller activities until our investigation has been completed." [markmail.org] The CertStar site [certstar.com] now says "Due to technical issues we are unable to process orders at this time. We are working hard to resolve the issue and apologize for any convenience caused. Please check back later."

    The Mozilla team is discussing revoking some root CA keys. [mozilla.org]

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...