Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security IT

Hackers May Have Nabbed Over 200 SSL Certificates 141

CWmike writes "Hackers may have obtained more than 200 digital certificates from a Dutch company after breaking into its network, including ones for Mozilla, Yahoo and the Tor project — a considerably higher number than DigiNotar has acknowledged earlier this week when it said 'several dozen' certificates had been acquired by attackers. Among the certificates acquired by the attackers in a mid-July hack of DigiNotar, Van de Looy's source said, were ones valid for mozilla.com, yahoo.com and torproject.org, a system that lets people connect to the Web anonymously. Mozilla confirmed that a certificate for its add-on site had been obtained by the DigiNotar attackers. 'DigiNotar informed us that they issued fraudulent certs for addons.mozilla.org in July, and revoked them within a few days of issue,' Johnathan Nightingale, director of Firefox development, said Wednesday. Looy's number is similar to the tally of certificates that Google has blacklisted in Chrome."
This discussion has been archived. No new comments can be posted.

Hackers May Have Nabbed Over 200 SSL Certificates

Comments Filter:
  • Boring (Score:5, Informative)

    by Mensa Babe ( 675349 ) * on Wednesday August 31, 2011 @07:13PM (#37270138) Homepage Journal
    All of the news about the SSL security flaws are starting to get boring. We had a related scandal just yesterday [slashdot.org]. The problem with SSL (or TLS, actually) is that it uses X.509 with all of its problems, like the mixed scope of certification authorities. It's like using global variables in your program - it is never a good idea. I can only agree with Bruce Schneier, Dan Kaminsky and virtually all of the competent security experts that we have to completely abandon the inherently flawed security model of X.509 certificates and finally fully embrace the DNSSEC as specified by the IETF. It is both stupid and irresponsible to have a trust system used to verify domain names in 2011 that is completely DNS-agnostic - and in fact designed in the 1980s when people were still manually sending the etc/hosts files around! There could be a lot of better solutions than the good old X.509 but in reality the only reasonable direction that we can choose today is to use the Domain Name System Security Extensions. Use 8.8.8.8 and 8.8.4.4 exclusively as your recursive resolvers. Configure your servers and clients. Define and use the RRSIG, DNSKEY, DS, NSEC, NSEC3 and NSEC3PARAM records in all of your zones. Use and verify them on every resolution. Educate people to do the same. This problem will not solve itself. We have to start acting.
  • Re:Boring (Score:4, Informative)

    by the_enigma_1983 ( 742079 ) <enigma.strudel-hound@com> on Wednesday August 31, 2011 @08:05PM (#37270532) Homepage

    In response to DigiNotar incidences, some people are removing the root CA for DigiNotar from their computers. This way your computer will not trust _anything_ signed by DigiNotar.

    With DNSSEC, if the people in charge of your DNS have an incident (hackers, malpractice or otherwise) which changes the "certificate" (for lack of a better word) for your website, you are stuck. There is no "root" certificate that you can remove.

  • Re:Wait a second... (Score:5, Informative)

    by bill_mcgonigle ( 4333 ) * on Wednesday August 31, 2011 @08:28PM (#37270700) Homepage Journal

    ...wouldn't the certs be useless without the associated private keys?

    No, the government of Iran generated a key and a CSR for *.google.com, had Diginotard sign them (not sure if this was social or technical hack) and then deployed them inline for a MitM attack on the residents of the area their organization controls.

    They have the key and the cert. They didn't get Google's key or cert, they have their own.

    I wonder how many dissidents have died because of this sloppy CA and the reliance on the CA system.

  • by Karl Cocknozzle ( 514413 ) <kcocknozzle.hotmail@com> on Wednesday August 31, 2011 @08:29PM (#37270702) Homepage

    Couldn't agree more. Links for the lazy: Convergence [convergence.io] and Perspectives [perspectives-project.org].

    Enjoy.

Lots of folks confuse bad management with destiny. -- Frank Hubbard

Working...