SlideShare ist ein Scribd-Unternehmen logo
1 von 52
Downloaden Sie, um offline zu lesen
Christopher Kunz | Filoo GmbH | 07.06.2010
CA failures and the future of Web AuthN
Dr. Christopher Kunz
About me and my company
Dr. Christopher Kunz
• PhD in Security in distributed systems
• Author, „PHP-Sicherheit“
filoo GmbH
• Hosting and Cloud services
• High-security data center in Frankfurt
• Oh, and we sell certificates 
• http://www.filoo.de/
Filoo GmbH | we make your net work | OSDC 2012
What‘s in store here
We will talk about CAs...
• And how you trust the Chinese government
• Why they are a point of failure for the Web
• If we can still trust them
We will talk about alternatives...
• To make CA failure less catastrophic
• To end the unhealthy reliance on CAs
• To combine secure protocols & increase security
Filoo GmbH | we make your net work | OSDC 2012
What is an SSL certificate?
„SSL certificates“ don‘t really exist
• SSL is a network protocol
• The certificates are actually X.509 PKI certificates
A certificate ties a keypair to an identity
• Keypair is used for the SSL handshake
Certificate = Sign(Pubkey + identity + meta info)
• After signing, it cannot be modified
Filoo GmbH | we make your net work | OSDC 2012
Important certificate lingo
Certificates have a lifespan
• Typically 1-2 years
Certificates can be revoked by the CA
• If the owner information becomes incorrect
• If the private key was lost
Two revocation methods
• CRL – List of revoked Cert IDs, periodically fetched
• OSCP – Near real-time status updates
• Part of the certificate, mnt-by CA
Filoo GmbH | we make your net work | OSDC 2012
Proof of identity
The identity is the tricky bit
• It has to be verified before signature
• Otherwise, the signer is not trustworthy
• The signer must verify & assert the identity
information
• The key owner must supply background info
The signer acts as a Trusted Third Party
• Comparable to a notary in real life
• That is what CAs do.
Filoo GmbH | we make your net work | OSDC 2012
Hey, let me verify that for you!
What CAs do:
Assert binding between keypair
and identity
The only reason for a CA‘s existence is trust.
Filoo GmbH | we make your net work | OSDC 2012
How certificates are validated
Certificate market is splitting up
Low-cost, low-assertion certificates
• Typically validated by whois + confirmation e-
mail („DV Certificates“)
• Can be forged by a resourceful adversary
High-cost, high-assertion certificates
• Validated by company registration documents
• „Extended Validation“ Certificates
Filoo GmbH | we make your net work | OSDC 2012
Commercial certificate market
Certificate issuance is lucrative
• Cost between 10 (DV) and 800 € (EV) / year
• Recurring revenue for the CA
• Relatively little effort
There are numerous CAs:
• Thawte
• Verisign / Symantec
• Comodo
• Governments, universities, corporations
Filoo GmbH | we make your net work | OSDC 2012
Why do you trust?
Nobody explicitly trusts a CA!
• You trust your browser vendor
• „Look for the lock“ – the lock has to be reliable
Browser truststores maintained by vendors
• CA / Browser Forum, http://www.cabforum.org/
• Members include CAs, Apple, Google, MS, KDE,
Mozilla, Opera, RIM
To be included, your CA must meet specific rules
Filoo GmbH | we make your net work | OSDC 2012
CA vetting process
Trusted CAs operate by either of these:
• WebTrust program for CAs
• ETSI 102042
• ETSI 101456
Compliance must be audited
• Expensive
• Time-consuming
• Not always a business case
Filoo GmbH | we make your net work | OSDC 2012
All the effort just to avoid this:
Filoo GmbH | we make your net work | OSDC 2012
Bah. Audits. No, thanks
Let‘s say we don‘t want a WebTrust audit
• It‘s expensive
• It expires (= recurring revenue for the auditor!)
• We are not sure we are in compliance
We need to issue valid & trusted certificates
• For our customer web servers
• For internal machines without FQDNs
• For spying on our employees
Filoo GmbH | we make your net work | OSDC 2012
Sub-CA delegation
The solution: Buy yourself a Sub-CA certificate
• A CA-signed certificate that can issue certificates
• In the PKi tree, you are now a node, not a leaf
• You can issue valid certificates for all domains
• No technical limitations, just contractual ones
• This causes issues
Filoo GmbH | we make your net work | OSDC 2012
Filoo GmbH | we make your net work | OSDC 2012
Map of CAs and Sub-CAs
Over 600 distinct players
• This is only about 1/4th of
the map...
• And the data is from 2010
All nodes are trusted by your
browser!
CA Map: German Sub-CA spidernet
Filoo GmbH | we make your net work | OSDC 2012
The SSL Observatory
Ran by the EFF
• Crawled the entire IPv4 space, port 443/TCP
• Saved all the certificates
• Voilá, a database of the SSL market
Observatory database is free
• You can build exciting things with it
• And find wackiness
• The colour map was built by EFF
Filoo GmbH | we make your net work | OSDC 2012
Who do you trust?
CA map shows 600 organizations
• Many are Sub-CAs
• Still, there is a lot of real CAs
160 CAs in current Firefox trust
store
• Settings  Advanced  Show
certificates  Certificate
Authorities
• „Builtin Object Token“
Filoo GmbH | we make your net work | OSDC 2012
All CAs are equal
Every CA on the map is
treated equally!
Filoo GmbH | we make your net work | OSDC 2012
Who do you trust?
Directly, you trust...
• The CNNIC
• Dhimyotis
• Hongkong Post Office
Indirectly, you trust...
• Ford Motors
• Walt Disney
• Adidas
...with your SSL traffic.
Filoo GmbH | we make your net work | OSDC 2012
Why so serious?
The more Sub-CAs, the more possiblities for MITM
Filoo GmbH | we make your net work | OSDC 2012
MITM how-to
Certificates cannot be forged or manipulated
• Unless you‘ve broken RSA2048...
• And/or know that P=NP or P!=NP
If an attacker wants to secretly sniff SSL traffic
1.They have to control the network
2.They have to control the encryption keys
With these two, they can launch MITM attacks
Filoo GmbH | we make your net work | OSDC 2012
The special roles of governments
Governments...
• Want to know what their citizens read and write
• Want to listen in on encrypted communication
On the other hand, they might have...
• Full control over Internet routes
• A government-controlled CA
• Ability to compel CAs and ISPs under their
jurisdiction
Filoo GmbH | we make your net work | OSDC 2012
Avenues of attack
To start issuing Man-in-the-Middle certificates...
• You can become a CA and pass WebTrust/ETSI
audits
• You can compel a CA to issue a certificate
• You can buy a Sub-CA certificate from a trusted
CA
• You can just crack a CA and issue away
Filoo GmbH | we make your net work | OSDC 2012
CA breach timeline
Numerous CA breaches last year
• About 600 certificates issued maliciously
• One CA deceased within weeks
Filoo GmbH | we make your net work | OSDC 2012
March, 2011:
Comodo
July, 2011:
DigiNotar
Feb, 2012:
TrustWave
Feb, 2012:
Symantec
breach
Incident 1: ComodoGate
March 23, 2011: Comodo announces 9 rogue
certificates were issued
•{www,mail}.google.com
•login.{live,yahoo,skype}.com
•addons.mozilla.org
•"Global Trustee“
Attacker gained entry via a subsidiary in Italy
•Found unsecured API call for CSR signing
•Able to automatically sign certs
•Claims to be from Iran
Filoo GmbH | we make your net work | OSDC 2012
Aftermath of ComodoGate
Much ado...
• Discussion about Comodo removal from
truststore
• Discussion about CA security as a whole
• Discussion about upcoming Iran cyberwar
...about nothing
• Comodo was not removed from browsers
• No review of compliance regulations
• No additional cyberwar
Filoo GmbH | we make your net work | OSDC 2012
Incident 2: DigiNotar
Filoo GmbH | we make your net work | OSDC 2012
DigiNotar breach
July 19, 2011: DigiNotar notice a security breach
They revoke some malicious certificates
They neglect to revoke some more
They forget to notify the public
They forget to notify the Dutch government
Filoo GmbH | we make your net work | OSDC 2012
DigiNotar breach – user perspective
In August, 2011, Iranian users see certificate
warnings for Google mail
They make the issue public
DigiNotar is forced to admit intrusion
Attack source was (again) in Iran
This time, lives were actually in danger
Filoo GmbH | we make your net work | OSDC 2012
Certificates issued during the breach
• *.google.com – revoked during the first analysis
• Several Extended Validation certificates
• Certificates for more Google services
• TOR project
• WordPress
• Mozilla Add-Ons
Over 530 fraudulent certificates
issued!
Filoo GmbH | we make your net work | OSDC 2012
So much fail...
DigiNotar had been hacked before...
• ...and didn‘t notice or care
They didn‘t have logs for certificate signing
• Or they were cleared by the attacker
Most of their certificates had neither OSCP nor CRL
information
• How to revoke, then?
Filoo GmbH | we make your net work | OSDC 2012
Consequences of DigiNotar breach
DigiNotar co-ran the Dutch state PKIoverheid
• This PKI was also affected
• Dutch government took over operations at
DigiNotar
Emergency browser updates removed DigiNotar
• Within weeks, DigiNotar goes dark
• No consequences for mother corporation VASCO
Other CAs are questioned and asked to re-audit
Filoo GmbH | we make your net work | OSDC 2012
Side note: Mozilla add-ons
addons.mozilla.org was affected by both attacks
Why is that?
• Addons not from that domain cause warnings
• Attacker might want to install malware/spyware
• Attacker might also want to block privacy addons
Mitigation?
• Use own CA and hardcode it in your app
• Works well in a walled garden
Filoo GmbH | we make your net work | OSDC 2012
Third incident: The perils of Sub-CAs
Trustwave sells Sub-CA certificates to companies
• One of these MITMed their own employees
• „Data Leakage Prevention“ a.k.a. „we read your
mail“
• Widespread criticism, initiative to remove
TrustWave from browser root
• TrustWave revokes Sub-CA certificate in
question, claims no abuse was possible
• CAB people issue „a stern warning“ to the CA
community
• Effectively no consequences
Filoo GmbH | we make your net work | OSDC 2012
Between a rock and a hard place
Some CAs are incompetent
Some CAs are greedy
Some CAs might be malicious
Filoo GmbH | we make your net work | OSDC 2012
Between a rock and a hard place
Why are we trusting these guys?
Because nobody has a better idea.
Filoo GmbH | we make your net work | OSDC 2012
Between a rock and a hard place
We cannot stop using encrypted communication
We cannot switch to using only self-signed certs
• Lack of trust root makes them MITM-susceptible
• No identity verification whatsoever
We need to fix the CA system
Or find a viable alternative
Filoo GmbH | we make your net work | OSDC 2012
HSTS / Pubkey pinning
HTTP Strict Transport Security
• Browser-supplied list of HTTPS-only URLs
• Prevents SSL-stripping MITM attacks
Public Key Pinning
• Expect a specific CA public key in SSL handshake
• Does not scale well into millions of sites
Both approaches aim to fix Google‘s problems
• Are they universally usable?
Filoo GmbH | we make your net work | OSDC 2012
DANE
DNS-based Authentication of Named Entities
• IETF working group
Tie certificate public keys to DNS entries
• example.com IN CAA MIIFEzCCBHygA....
Only useful in connection with DNSSEC
• Attacker could spoof plain DNS CAA replies
More reliance on decent DNS administration
• When will we see DNSSEC coverage?
Filoo GmbH | we make your net work | OSDC 2012
Convergence
Thesis: „The CA system is broken. Let‘s not fix it.“
Approach: Check each self-signed certificate from
multiple angles
Goal: Make MITM for self-signed certificates
impossible
Currently a beta Firefox plug-in
Filoo GmbH | we make your net work | OSDC 2012
The Convergence principle
Filoo GmbH | we make your net work | OSDC 2012
Convergence features
Notary servers in multiple jurisdictions
• You can rely on it even while in China or the T-
Mobile wi-fi network
Encrypted requests to the notaries
• Man in the Middle cannot build a surf history
•
Randomly forward requests to 1-out-of-n notaries
• Privacy towards the notary – they can‘t build a
surf history
Filoo GmbH | we make your net work | OSDC 2012
Convergence Notaries
Default behavior:
1. Open an SSL connection to the site in question
2. Obtain the certificate hash (fingerprint)
3. Return the hash to the client
Hash differences  MITM; abort connection!
Notary servers are OSS; you can use them to...
• check the SSL Observatory
• work in RFC 1918 address space
• check RIPE / DNSSEC / any other source
Filoo GmbH | we make your net work | OSDC 2012
Convergence attack scenarios
Antagonists could perform DoS on notaries
• Mitigated by crowdsourcing a large number
They could reroute/block requests
• No security loss for client, SSL handshake fails
They could run several corrupted notaries
• Community would quickly single those out
Filoo GmbH | we make your net work | OSDC 2012
Convergence issues
Increased SSL handshake overhead
• No support for client certificates
Border cases for open wi-fi with „captive portals“
• Often perform SSL stripping MITM to reroute
HTTP traffic
No verifiable identity information
False positives for load-balanced sites
• Some sites have different certificates on their
nodes
Filoo GmbH | we make your net work | OSDC 2012
Sovereign Keys
Keep track of the full history for a DN
• All keypairs associated with it
• Append-only data structure
• Additions only with a special key
Route around certificate failures
• Each sovereign key hash is a .onion address
• If you can`t connect via SSL, connect via TOR
Filoo GmbH | we make your net work | OSDC 2012
Sovereign Keys caveats
If you lose the Sovereign key, your DN is lost
• You can never renew or reissue a certificate
• You cannot retrieve the key
• You cannot purge the DN from the history
Attacks are difficult
• Attacker cannot issue a Sovereign-protected
certificate
• They need the Sovereign Key
• They cannot initiate a DoS
Filoo GmbH | we make your net work | OSDC 2012
Further reading
EFF and SSL Observatory:
• https://www.eff.org/observatory/
• https://www.eff.org/files/colour_map_of_CAs.pdf
ComodoGate:
• http://pastebin.com/74KXCaEZ
• http://www.f-
secure.com/weblog/archives/00002128.html
DigiNotar hack:
• http://blog.gerv.net/2011/09/diginotar-
compromise/
Filoo GmbH | we make your net work | OSDC 2012
Further further reading
Convergence
• http://convergence.io/
Sovereign Keys
• https://www.eff.org/sovereign-keys
CA/Browser Forum
• http://www.cabforum.org/
WebTrust
• http://www.webtrust.org/homepage-
documents/item27839.aspx
Filoo GmbH | we make your net work | OSDC 2012
Summary
CAs can and do fail, they will fail again
• ComodoGate, DigiNotar et al.
We currently don‘t have a universal replacement
Some ideas can fix the worst issues
• Convergence
• Sovereign Keys
Some projects need to be developed more
• DANE
• Key Pinning / HSTS
Filoo GmbH | we make your net work | OSDC 2012
Thank you
I‘m looking forward to your questions
and comments!
Contact me:
<chris@filoo.de>
Filoo GmbH | we make your net work | OSDC 2012

Weitere ähnliche Inhalte

Ähnlich wie OSDC 2012 | CA failures and the future of Web authentication by Dr. Christopher Kunz

Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014
Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014
Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014
Zivtech, LLC
 

Ähnlich wie OSDC 2012 | CA failures and the future of Web authentication by Dr. Christopher Kunz (20)

Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
 
ITAM UK 2017 Vendor negotiations in a cloudy world_Kylie Fowler
ITAM UK 2017 Vendor negotiations in a cloudy world_Kylie FowlerITAM UK 2017 Vendor negotiations in a cloudy world_Kylie Fowler
ITAM UK 2017 Vendor negotiations in a cloudy world_Kylie Fowler
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Identity Gateway with the ForgeRock Identity Platform - So What’s New?Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
 
Client Cert Deployment Models and Hardware Tokens/Smart Cards
Client Cert Deployment Models and Hardware Tokens/Smart CardsClient Cert Deployment Models and Hardware Tokens/Smart Cards
Client Cert Deployment Models and Hardware Tokens/Smart Cards
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
 
Nextcloud als On-Premises Lösung für hochsicheren Datenaustausch (Frank Karli...
Nextcloud als On-Premises Lösung für hochsicheren Datenaustausch (Frank Karli...Nextcloud als On-Premises Lösung für hochsicheren Datenaustausch (Frank Karli...
Nextcloud als On-Premises Lösung für hochsicheren Datenaustausch (Frank Karli...
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
 
Flowable: Life, death and all the other processes in between
Flowable: Life, death and all the other processes in betweenFlowable: Life, death and all the other processes in between
Flowable: Life, death and all the other processes in between
 
Bringing an open source project to the Linux Foundation
Bringing an open source project to the Linux FoundationBringing an open source project to the Linux Foundation
Bringing an open source project to the Linux Foundation
 
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander BerkouwerO365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
 
Idiligo presentation
Idiligo presentationIdiligo presentation
Idiligo presentation
 
Idiligo presentation
Idiligo presentationIdiligo presentation
Idiligo presentation
 
Idiligo presentation
Idiligo presentationIdiligo presentation
Idiligo presentation
 
Cloudtenna Hour With An Expert Webinar
Cloudtenna Hour With An Expert WebinarCloudtenna Hour With An Expert Webinar
Cloudtenna Hour With An Expert Webinar
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
 
UAF Case Study by NTT Docomo
UAF Case Study by NTT DocomoUAF Case Study by NTT Docomo
UAF Case Study by NTT Docomo
 
Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014
Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014
Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014
 

Kürzlich hochgeladen

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Kürzlich hochgeladen (20)

Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 

OSDC 2012 | CA failures and the future of Web authentication by Dr. Christopher Kunz

  • 1. Christopher Kunz | Filoo GmbH | 07.06.2010 CA failures and the future of Web AuthN Dr. Christopher Kunz
  • 2. About me and my company Dr. Christopher Kunz • PhD in Security in distributed systems • Author, „PHP-Sicherheit“ filoo GmbH • Hosting and Cloud services • High-security data center in Frankfurt • Oh, and we sell certificates  • http://www.filoo.de/ Filoo GmbH | we make your net work | OSDC 2012
  • 3. What‘s in store here We will talk about CAs... • And how you trust the Chinese government • Why they are a point of failure for the Web • If we can still trust them We will talk about alternatives... • To make CA failure less catastrophic • To end the unhealthy reliance on CAs • To combine secure protocols & increase security Filoo GmbH | we make your net work | OSDC 2012
  • 4. What is an SSL certificate? „SSL certificates“ don‘t really exist • SSL is a network protocol • The certificates are actually X.509 PKI certificates A certificate ties a keypair to an identity • Keypair is used for the SSL handshake Certificate = Sign(Pubkey + identity + meta info) • After signing, it cannot be modified Filoo GmbH | we make your net work | OSDC 2012
  • 5. Important certificate lingo Certificates have a lifespan • Typically 1-2 years Certificates can be revoked by the CA • If the owner information becomes incorrect • If the private key was lost Two revocation methods • CRL – List of revoked Cert IDs, periodically fetched • OSCP – Near real-time status updates • Part of the certificate, mnt-by CA Filoo GmbH | we make your net work | OSDC 2012
  • 6. Proof of identity The identity is the tricky bit • It has to be verified before signature • Otherwise, the signer is not trustworthy • The signer must verify & assert the identity information • The key owner must supply background info The signer acts as a Trusted Third Party • Comparable to a notary in real life • That is what CAs do. Filoo GmbH | we make your net work | OSDC 2012
  • 7. Hey, let me verify that for you! What CAs do: Assert binding between keypair and identity The only reason for a CA‘s existence is trust. Filoo GmbH | we make your net work | OSDC 2012
  • 8. How certificates are validated Certificate market is splitting up Low-cost, low-assertion certificates • Typically validated by whois + confirmation e- mail („DV Certificates“) • Can be forged by a resourceful adversary High-cost, high-assertion certificates • Validated by company registration documents • „Extended Validation“ Certificates Filoo GmbH | we make your net work | OSDC 2012
  • 9. Commercial certificate market Certificate issuance is lucrative • Cost between 10 (DV) and 800 € (EV) / year • Recurring revenue for the CA • Relatively little effort There are numerous CAs: • Thawte • Verisign / Symantec • Comodo • Governments, universities, corporations Filoo GmbH | we make your net work | OSDC 2012
  • 10. Why do you trust? Nobody explicitly trusts a CA! • You trust your browser vendor • „Look for the lock“ – the lock has to be reliable Browser truststores maintained by vendors • CA / Browser Forum, http://www.cabforum.org/ • Members include CAs, Apple, Google, MS, KDE, Mozilla, Opera, RIM To be included, your CA must meet specific rules Filoo GmbH | we make your net work | OSDC 2012
  • 11. CA vetting process Trusted CAs operate by either of these: • WebTrust program for CAs • ETSI 102042 • ETSI 101456 Compliance must be audited • Expensive • Time-consuming • Not always a business case Filoo GmbH | we make your net work | OSDC 2012
  • 12. All the effort just to avoid this: Filoo GmbH | we make your net work | OSDC 2012
  • 13. Bah. Audits. No, thanks Let‘s say we don‘t want a WebTrust audit • It‘s expensive • It expires (= recurring revenue for the auditor!) • We are not sure we are in compliance We need to issue valid & trusted certificates • For our customer web servers • For internal machines without FQDNs • For spying on our employees Filoo GmbH | we make your net work | OSDC 2012
  • 14. Sub-CA delegation The solution: Buy yourself a Sub-CA certificate • A CA-signed certificate that can issue certificates • In the PKi tree, you are now a node, not a leaf • You can issue valid certificates for all domains • No technical limitations, just contractual ones • This causes issues Filoo GmbH | we make your net work | OSDC 2012
  • 15. Filoo GmbH | we make your net work | OSDC 2012 Map of CAs and Sub-CAs Over 600 distinct players • This is only about 1/4th of the map... • And the data is from 2010 All nodes are trusted by your browser!
  • 16. CA Map: German Sub-CA spidernet Filoo GmbH | we make your net work | OSDC 2012
  • 17. The SSL Observatory Ran by the EFF • Crawled the entire IPv4 space, port 443/TCP • Saved all the certificates • Voilá, a database of the SSL market Observatory database is free • You can build exciting things with it • And find wackiness • The colour map was built by EFF Filoo GmbH | we make your net work | OSDC 2012
  • 18. Who do you trust? CA map shows 600 organizations • Many are Sub-CAs • Still, there is a lot of real CAs 160 CAs in current Firefox trust store • Settings  Advanced  Show certificates  Certificate Authorities • „Builtin Object Token“ Filoo GmbH | we make your net work | OSDC 2012
  • 19. All CAs are equal Every CA on the map is treated equally! Filoo GmbH | we make your net work | OSDC 2012
  • 20. Who do you trust? Directly, you trust... • The CNNIC • Dhimyotis • Hongkong Post Office Indirectly, you trust... • Ford Motors • Walt Disney • Adidas ...with your SSL traffic. Filoo GmbH | we make your net work | OSDC 2012
  • 21. Why so serious? The more Sub-CAs, the more possiblities for MITM Filoo GmbH | we make your net work | OSDC 2012
  • 22. MITM how-to Certificates cannot be forged or manipulated • Unless you‘ve broken RSA2048... • And/or know that P=NP or P!=NP If an attacker wants to secretly sniff SSL traffic 1.They have to control the network 2.They have to control the encryption keys With these two, they can launch MITM attacks Filoo GmbH | we make your net work | OSDC 2012
  • 23. The special roles of governments Governments... • Want to know what their citizens read and write • Want to listen in on encrypted communication On the other hand, they might have... • Full control over Internet routes • A government-controlled CA • Ability to compel CAs and ISPs under their jurisdiction Filoo GmbH | we make your net work | OSDC 2012
  • 24. Avenues of attack To start issuing Man-in-the-Middle certificates... • You can become a CA and pass WebTrust/ETSI audits • You can compel a CA to issue a certificate • You can buy a Sub-CA certificate from a trusted CA • You can just crack a CA and issue away Filoo GmbH | we make your net work | OSDC 2012
  • 25. CA breach timeline Numerous CA breaches last year • About 600 certificates issued maliciously • One CA deceased within weeks Filoo GmbH | we make your net work | OSDC 2012 March, 2011: Comodo July, 2011: DigiNotar Feb, 2012: TrustWave Feb, 2012: Symantec breach
  • 26. Incident 1: ComodoGate March 23, 2011: Comodo announces 9 rogue certificates were issued •{www,mail}.google.com •login.{live,yahoo,skype}.com •addons.mozilla.org •"Global Trustee“ Attacker gained entry via a subsidiary in Italy •Found unsecured API call for CSR signing •Able to automatically sign certs •Claims to be from Iran Filoo GmbH | we make your net work | OSDC 2012
  • 27. Aftermath of ComodoGate Much ado... • Discussion about Comodo removal from truststore • Discussion about CA security as a whole • Discussion about upcoming Iran cyberwar ...about nothing • Comodo was not removed from browsers • No review of compliance regulations • No additional cyberwar Filoo GmbH | we make your net work | OSDC 2012
  • 28. Incident 2: DigiNotar Filoo GmbH | we make your net work | OSDC 2012
  • 29. DigiNotar breach July 19, 2011: DigiNotar notice a security breach They revoke some malicious certificates They neglect to revoke some more They forget to notify the public They forget to notify the Dutch government Filoo GmbH | we make your net work | OSDC 2012
  • 30. DigiNotar breach – user perspective In August, 2011, Iranian users see certificate warnings for Google mail They make the issue public DigiNotar is forced to admit intrusion Attack source was (again) in Iran This time, lives were actually in danger Filoo GmbH | we make your net work | OSDC 2012
  • 31. Certificates issued during the breach • *.google.com – revoked during the first analysis • Several Extended Validation certificates • Certificates for more Google services • TOR project • WordPress • Mozilla Add-Ons Over 530 fraudulent certificates issued! Filoo GmbH | we make your net work | OSDC 2012
  • 32. So much fail... DigiNotar had been hacked before... • ...and didn‘t notice or care They didn‘t have logs for certificate signing • Or they were cleared by the attacker Most of their certificates had neither OSCP nor CRL information • How to revoke, then? Filoo GmbH | we make your net work | OSDC 2012
  • 33. Consequences of DigiNotar breach DigiNotar co-ran the Dutch state PKIoverheid • This PKI was also affected • Dutch government took over operations at DigiNotar Emergency browser updates removed DigiNotar • Within weeks, DigiNotar goes dark • No consequences for mother corporation VASCO Other CAs are questioned and asked to re-audit Filoo GmbH | we make your net work | OSDC 2012
  • 34. Side note: Mozilla add-ons addons.mozilla.org was affected by both attacks Why is that? • Addons not from that domain cause warnings • Attacker might want to install malware/spyware • Attacker might also want to block privacy addons Mitigation? • Use own CA and hardcode it in your app • Works well in a walled garden Filoo GmbH | we make your net work | OSDC 2012
  • 35. Third incident: The perils of Sub-CAs Trustwave sells Sub-CA certificates to companies • One of these MITMed their own employees • „Data Leakage Prevention“ a.k.a. „we read your mail“ • Widespread criticism, initiative to remove TrustWave from browser root • TrustWave revokes Sub-CA certificate in question, claims no abuse was possible • CAB people issue „a stern warning“ to the CA community • Effectively no consequences Filoo GmbH | we make your net work | OSDC 2012
  • 36. Between a rock and a hard place Some CAs are incompetent Some CAs are greedy Some CAs might be malicious Filoo GmbH | we make your net work | OSDC 2012
  • 37. Between a rock and a hard place Why are we trusting these guys? Because nobody has a better idea. Filoo GmbH | we make your net work | OSDC 2012
  • 38. Between a rock and a hard place We cannot stop using encrypted communication We cannot switch to using only self-signed certs • Lack of trust root makes them MITM-susceptible • No identity verification whatsoever We need to fix the CA system Or find a viable alternative Filoo GmbH | we make your net work | OSDC 2012
  • 39. HSTS / Pubkey pinning HTTP Strict Transport Security • Browser-supplied list of HTTPS-only URLs • Prevents SSL-stripping MITM attacks Public Key Pinning • Expect a specific CA public key in SSL handshake • Does not scale well into millions of sites Both approaches aim to fix Google‘s problems • Are they universally usable? Filoo GmbH | we make your net work | OSDC 2012
  • 40. DANE DNS-based Authentication of Named Entities • IETF working group Tie certificate public keys to DNS entries • example.com IN CAA MIIFEzCCBHygA.... Only useful in connection with DNSSEC • Attacker could spoof plain DNS CAA replies More reliance on decent DNS administration • When will we see DNSSEC coverage? Filoo GmbH | we make your net work | OSDC 2012
  • 41. Convergence Thesis: „The CA system is broken. Let‘s not fix it.“ Approach: Check each self-signed certificate from multiple angles Goal: Make MITM for self-signed certificates impossible Currently a beta Firefox plug-in Filoo GmbH | we make your net work | OSDC 2012
  • 42. The Convergence principle Filoo GmbH | we make your net work | OSDC 2012
  • 43. Convergence features Notary servers in multiple jurisdictions • You can rely on it even while in China or the T- Mobile wi-fi network Encrypted requests to the notaries • Man in the Middle cannot build a surf history • Randomly forward requests to 1-out-of-n notaries • Privacy towards the notary – they can‘t build a surf history Filoo GmbH | we make your net work | OSDC 2012
  • 44. Convergence Notaries Default behavior: 1. Open an SSL connection to the site in question 2. Obtain the certificate hash (fingerprint) 3. Return the hash to the client Hash differences  MITM; abort connection! Notary servers are OSS; you can use them to... • check the SSL Observatory • work in RFC 1918 address space • check RIPE / DNSSEC / any other source Filoo GmbH | we make your net work | OSDC 2012
  • 45. Convergence attack scenarios Antagonists could perform DoS on notaries • Mitigated by crowdsourcing a large number They could reroute/block requests • No security loss for client, SSL handshake fails They could run several corrupted notaries • Community would quickly single those out Filoo GmbH | we make your net work | OSDC 2012
  • 46. Convergence issues Increased SSL handshake overhead • No support for client certificates Border cases for open wi-fi with „captive portals“ • Often perform SSL stripping MITM to reroute HTTP traffic No verifiable identity information False positives for load-balanced sites • Some sites have different certificates on their nodes Filoo GmbH | we make your net work | OSDC 2012
  • 47. Sovereign Keys Keep track of the full history for a DN • All keypairs associated with it • Append-only data structure • Additions only with a special key Route around certificate failures • Each sovereign key hash is a .onion address • If you can`t connect via SSL, connect via TOR Filoo GmbH | we make your net work | OSDC 2012
  • 48. Sovereign Keys caveats If you lose the Sovereign key, your DN is lost • You can never renew or reissue a certificate • You cannot retrieve the key • You cannot purge the DN from the history Attacks are difficult • Attacker cannot issue a Sovereign-protected certificate • They need the Sovereign Key • They cannot initiate a DoS Filoo GmbH | we make your net work | OSDC 2012
  • 49. Further reading EFF and SSL Observatory: • https://www.eff.org/observatory/ • https://www.eff.org/files/colour_map_of_CAs.pdf ComodoGate: • http://pastebin.com/74KXCaEZ • http://www.f- secure.com/weblog/archives/00002128.html DigiNotar hack: • http://blog.gerv.net/2011/09/diginotar- compromise/ Filoo GmbH | we make your net work | OSDC 2012
  • 50. Further further reading Convergence • http://convergence.io/ Sovereign Keys • https://www.eff.org/sovereign-keys CA/Browser Forum • http://www.cabforum.org/ WebTrust • http://www.webtrust.org/homepage- documents/item27839.aspx Filoo GmbH | we make your net work | OSDC 2012
  • 51. Summary CAs can and do fail, they will fail again • ComodoGate, DigiNotar et al. We currently don‘t have a universal replacement Some ideas can fix the worst issues • Convergence • Sovereign Keys Some projects need to be developed more • DANE • Key Pinning / HSTS Filoo GmbH | we make your net work | OSDC 2012
  • 52. Thank you I‘m looking forward to your questions and comments! Contact me: <chris@filoo.de> Filoo GmbH | we make your net work | OSDC 2012