Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Encryption

Anonymous Source Claims Feds Demand Private SSL Keys From Web Services 276

Lauren Weinstein writes "With further confirmation of the longstanding rumor that the U.S. government (and, we can safely assume, other governments around the world) have been pressuring major Internet firms to provide their 'master' SSL keys for government surveillance purposes, we are rapidly approaching a critical technological crossroad. It is now abundantly clear — as many of us have suspected all along — that governments and surveillance agencies of all stripes — Western, Eastern, democratic, and authoritarian, will pour essentially unlimited funds into efforts to monitor Internet communications." If this is true it means that SSL/TLS to any Internet service could be useless — the authorities could simply man-in-the-middle anyone. Without knowing who has given keys over, or if anyone has given keys over... The NSA does claim encryption poses a problem for them, but honesty isn't their best attribute. The source claims that major providers at least have resisted (assuming it is happening), but that smaller companies may have folded to the pressure.
This discussion has been archived. No new comments can be posted.

Anonymous Source Claims Feds Demand Private SSL Keys From Web Services

Comments Filter:
  • by meta-monkey ( 321000 ) on Wednesday July 24, 2013 @02:50PM (#44372719) Journal

    Of course encryption is a problem for them. It's the same problem Allied intelligence had acting on information that could only be attained because Enigma was broken. [wikipedia.org]

  • Re:Self signed? (Score:2, Insightful)

    by GameboyRMH ( 1153867 ) <gameboyrmh&gmail,com> on Wednesday July 24, 2013 @02:54PM (#44372757) Journal

    In some situations yes, but in those same situations I don't think this news really changes anything (where you set up the cert yourself on one of your own servers for use by yourself, for instance). Otherwise this just means that these certs are slightly less secure because governments have a copy. If you're connecting to a strange server, it may be better to have a signed cert because they're still not quite as easy to come by as a self-signed one.

    In any case this doesn't change the old fact that a self-signed cert is at least as good as an unsecured connection and browsers should stop throwing a shit-fit when they run into one.

  • by TWiTfan ( 2887093 ) on Wednesday July 24, 2013 @02:57PM (#44372803)

    It's not a "man in the middle" attack. It's the "government on top" attack.

  • by Anonymous Coward on Wednesday July 24, 2013 @02:58PM (#44372813)

    So the next time the US wants to chastise another country for spying on their citizens, the response is going to be "go away you hypocritical assholes".

    America has lost her moral compass, and is quickly turning into a police state.

    Papers please comrade.

  • by xxxJonBoyxxx ( 565205 ) on Wednesday July 24, 2013 @02:59PM (#44372835)

    >> "The government is definitely demanding SSL keys from providers," said one person who has responded to government attempts to obtain encryption keys. The source spoke with CNET on condition of anonymity.

    So...some guy said "yes, they're collecting keys." No written evidence, no names. We demand "citation" from people posting backstories of cartoon characters on Wikipedia, so how exactly is this "confirmation" of anything?

  • Re:Self signed? (Score:5, Insightful)

    by Sarten-X ( 1102295 ) on Wednesday July 24, 2013 @03:00PM (#44372845) Homepage

    No. When a CA signs a certificate, they don't get the private key used for decryption. They just assert that a particular public key really does belong to who it says.

    If the NSA has Verisign's key, for example, they'd be able to do two things:

    1. decrypt traffic sent to Versign, which isn't very useful in itself
    2. Create and sign their own certificates as though they were Verisign.

    The latter is where the man-in-the-middle attack comes in. The NSA can claim to be whoever you're trying to reach, and the certificate will look valid and be trusted by default on any system that trusts Verisign. On the other hand, a self-signed certificate isn't signed by anybody else. The NSA doesn't need anyone else's private keys to make their own and claim to be anyone. The client will see the certificate, ask you if you trust it, and unless you're in the habit of memorizing certificate fingerprints, you won't notice a difference. Once any certificate is trusted (either by default or by your acceptance), your traffic will be sent to (and decrypted by) the certificate holder.

    This is actually already a problem. CAs have been compromised, and their stolen credentials have been used to sign certificates claiming to be governments, Microsoft, and other generally-trusted sites. The apparently-trusted certificates are then used to make scams look more legitimate.

  • by Anonymous Coward on Wednesday July 24, 2013 @03:08PM (#44372931)

    america has been a police state ruled by fear for some time now, your among the most oppressed people in the world but its balanced by ignorance, its taken you guys this long to notice.

  • by Alok ( 37687 ) on Wednesday July 24, 2013 @03:12PM (#44372963)

    Do you really expect people to say this publicly, when the most likely consequence is imprisonment and a media circus that paints them as evil villains?

  • Re:Self signed? (Score:4, Insightful)

    by Speare ( 84249 ) on Wednesday July 24, 2013 @03:27PM (#44373121) Homepage Journal
    Please see Schneier's paper on the "compelled certificate creation attack." Rather than asking a CA for the keys from Alice to Bob, they could compel a CA to vouch for an Alice to Eve, Eve to Bob connection as if it were Alice to Bob directly.
  • by lgw ( 121541 ) on Wednesday July 24, 2013 @03:38PM (#44373259) Journal

    I chose "the activities of a citizen" as a way to say "what we do, not who we are". Keeping "who we are" records: birth certificates, permits licensing of various kinds, etc, is different in kind from monitoring daily activities. But I'm no lawyer and don't know how to say this better.

    Also, why does the government need "census data" beyond a simple headcount? Heck, I'd like to move to an income tax system that's purely a payroll tax (so the government doesn't learn how much any given individual makes, but can still tax our income).

    The government collects every bit of information it possibly can, but it's time to start saying "NO! Find a way to do that without spying on us!" It's time for the pendulum to swing the other way.

Today is a good day for information-gathering. Read someone else's mail file.

Working...