Site Certificates Forged; Internet Security Not So Secure

from the lock-and-key dept

Ed Felten has the details on a rather worrisome bit of information released by some security researchers on how to forge site certificates. Generally speaking, secure certificates for sites were considered to a pretty definite sign that you were safely connected to a particular site -- and transferring any data between you and that site securely. The ability to forge such certificates throws all that into doubt, and it severely disrupts the ability to be confident in a secure transaction online. Felten describes how this is fixable (though, some certification authorities should have made changes a while ago to prevent this), but it's yet another reminder that what's secure today might not be so secure tomorrow.


Reader Comments (rss)

(Flattened / Threaded)

  1.  
    icon
    ECA (profile), Dec 30th, 2008 @ 10:04pm

    Hmm?

    This has been happening for years.
    What is NEW?
    And a REAL certificate, I thought, was only $99 per year..
    And the Cert, PROVES WHAT?? that they PAID for the Cert..
    NOT that MS certifies the site, or EVEN MONITORS it..

     

    reply to this | link to this | view in thread ]

  2.  
    identicon
    Anonymous Coward, Dec 30th, 2008 @ 10:40pm

    Re: Hmm?

    "NOT that MS certifies the site, or EVEN MONITORS it.."

    Apple doesnt use certificates? what do they use...
    (what do you mean by "MS"?)

     

    reply to this | link to this | view in thread ]

  3.  
    identicon
    Anonymous Coward, Dec 30th, 2008 @ 10:41pm

    This is just another reason why successful technology evolves - we've known since 2004 that someone with enough processing power could generate a duplicate MD5 hash. While competition isn't currently as much of a motivator in this particular subfield of security, if we allow our computer security technology to sit and age, it will eventually be made obsolete by increased processing power and new research. It is nice to be able to rely on one function for such a long time, but just because it is reliable at the moment doesn't mean that new research should be ignored.

    I do recognize that creating a comparable system is a major undertaking, but that is only more reason that innovation in this field should be continuous. If it takes five years to develop the proper framework, then work on it should begin at least five years before the current system is made obsolete. The fact that it is difficult to give a timeline for such obsolescence only makes it more essential that work on a higher-level system should begin immediately after the current system is implemented.

     

    reply to this | link to this | view in thread ]

  4.  
    icon
    Mike (profile), Dec 30th, 2008 @ 11:07pm

    Re: Hmm?

    This has been happening for years.

    Um. Not quite.

    What is NEW?

    Read the details. Plenty.

    And a REAL certificate, I thought, was only $99 per year..

    What does the cost have to do with anything?

    NOT that MS certifies the site, or EVEN MONITORS it..

    Huh? What does Microsoft have to do with anything?

     

    reply to this | link to this | view in thread ]

  5.  
    identicon
    Lawrence D'Oliveiro, Dec 31st, 2008 @ 1:40am

    MD5 Is Bad, Don't Use MD5, M'Kay

    MD5 has been known to be week for a few years now. All the smart people started moving off it soon after. What happened is that a few certificate authorities (CAs) have been lax. Some CAs have been shown to be lax in other ways as well, so while this is disappointing, it shouldn't be a complete shock.

    The right solution is to drop these CAs' root certificates from the popular browsers. They can't be trusted, so they should be dumped.

     

    reply to this | link to this | view in thread ]

  6.  
    identicon
    Twinrova, Dec 31st, 2008 @ 4:29am

    There's no such thing as "secure" in a digital environment.

    It's a cat & mouse game: New technology comes out which makes it easier to crack old technology cryptography.

    The certificate cryptography has run its last leg, but this should have been expected. Now that we have even more powerful software at our disposal, it was just a matter of time before this occurred.

    What sucks about the cat & mouse game is that often the "break" is found faster than a new development strategy can be enforced.

    Or does all this DRM cracking teach you nothing?

    Personal note: As a consumer, it is YOUR responsibility to monitor your accounts. You should always review your credit report once per year (it's free), watch your bank statement DAILY, and be aware passing your credit card/bank info over the internet is NEVER 100% safe (what's to stop a thief working for the company to steal the number?).

    This is why you don't send information to sites you don't know/trust.

     

    reply to this | link to this | view in thread ]

  7.  
    identicon
    JJ, Dec 31st, 2008 @ 7:04am

    Re: There's no such thing as "secure" in a digital environment.

    The certificate cryptography has run its last leg

    Umm, no it hasn't. Read closer. It's a fundamentally strong, well-designed system, and one of the optional components of it, which has been known for years to be weak, was finally cracked completely. The rest of the system (i.e. when used with hash functions other than MD-5) is still as secure as ever. In this case, a minor update to CA policies (stop using MD5) and web browsers (to reject or warn about use of MD5) solves the problem quite simply.

    often the "break" is found faster than a new development strategy can be enforced.

    Not in this case. I would bet that modern public-key encryption won't be completely cracked until the development of quantum computers.

    Or does all this DRM cracking teach you nothing?

    That's right, all this DRM cracking teaches us nothing at all about public-key encryption. Cracking DRM is much easier, because every user is necessarily given both the key and the lock, and someone just has to figure out how they work together. There's no such thing as un-crackable DRM. The tech guys realize this, but the media companies don't, so there's a huge industry of con artists selling new "stronger" DRM schemes to media companies and then acting surprised when they get cracked.

    If you aren't part of the solution, there's a lot of money to be made in prolonging the problem!

     

    reply to this | link to this | view in thread ]

  8.  
    icon
    chris (profile), Dec 31st, 2008 @ 12:00pm

    Re: There's no such thing as "secure" in a digital environment.

    Or does all this DRM cracking teach you nothing?

    it teaches us plenty about how NOT to implement PKI. i also teaches us that time and talent will cannot be stopped with money.

     

    reply to this | link to this | view in thread ]

  9.  
    identicon
    Old_Paranoid, Dec 31st, 2008 @ 8:21pm

    MD5 ongoing usage

    Some CA's have been lax. Given the publicity now, it is my understanding that they will move to more modern hashes shortly. While SHA-1 is more resistant, we expect the first collision to be generated in SHA-1 shortly. Thus, we need to be moving to the stronger hashes of the SHA-2 family in the near future. I expect a long transition time though, as SHA-2 support and integration in cert validation is limited at best in legacy platforms.

    The real problem here is not the root certificates. The root organizations will be updated shortly. It is in the secondary certificates, which are rooted in a cert that uses MD5.

    As I understand it, this vulnerability relies upon a malicious applicant who provides one data string to the CA for cert generation, having previously generated another string with the same hash. As I understand it, much of the data is provided by the applicant, including the cert issuance time, which may not be verified by the CA when the cert is issued.

    Unfortunately, many standards still require MD5, such as digest authentication. This is clearly a problem.

     

    reply to this | link to this | view in thread ]

  10.  
    identicon
    Anonymous Coward, Jan 1st, 2009 @ 11:30am

    Re: There's no such thing as "secure" in a digital environment.

    Personal note: As a consumer, it is YOUR responsibility to monitor your accounts.
    Why should it be MY responsibility to monitor the actions of others?

     

    reply to this | link to this | view in thread ]

  11.  
    identicon
    TG, Jan 3rd, 2009 @ 11:40am

    This is not a crisis in any sense of the word.

    Some Certicate Authorities are offering SSL certificates with no verification at all, so the application of creating two certificates with colliding MD5 hashes, getting the one certified and then using the other, is limited at best. There's nothing to be gained from this.

    In practice, no one cares about the browser warnings they get even when SSL certificates are outdated or wrong, because we're so used to them by now from lazy companies who can't be bothered to certify the right domain name.
    We all just click through the warnings because we want to use the site.

    If you don't believe me, take it from a guy who really knows what he's talking about: http://www.schneier.com/blog/archives/2008/12/forging_ssl_cer.html

    The only thing this research hopefully does, is to serve as a wake-up call to everyone to stop using MD5 because it was cracked years ago.

     

    reply to this | link to this | view in thread ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Save me a cookie
  • Note: A CRLF will be replaced by a break tag (<br>), all other allowable HTML will remain intact
  • Allowed HTML Tags: <b> <i> <a> <em> <br> <strong> <blockquote> <hr> <tt>
Follow Techdirt
A word from our sponsors...
Essential Reading
Techdirt Reading List
Techdirt Insider Chat
A word from our sponsors...
Recent Stories
A word from our sponsors...

Close

Email This