Monday, July 14, 2014

Digital certificates could allow spoofing ... could you give it to me in English?

On July 10, Microsoft published a bulletin stating that improperly issued digital certificates could allow spoofing. What exactly does that mean though? And for that matter, what is a digital certificate anyway?

In the physical world, you often conduct business with others face-to-face. If you do not personally know someone, you might rely on a trusted third party to vouch for the person's identity. That trusted third party might be a mutual friend, or it might be a government office that issues identification documents (passports, driver's licenses, state identification cards, school IDs, and the like). Digital certificates are the online equivalent of an identification card. See my article on the Heartbleed OpenSSL vulnerability for a thorough (but easily readable) explanation of digital certificates.

The above analogy implies some degree of trust - you accept a passport as identification because you trust that the issuing government can correctly identify a citizen. Likewise, digital certificates rely on a trusted third party, known as a Certificate Authority or CA. Through some complex and clever math, your computer can be certain that a web site has a particular certificate - but that knowledge by itself is not of much use. After all, anyone could create a certificate that says "I am Facebook." We rely on the CA to verify the identity of the real Facebook before issuing a certificate for Facebook.com.

And there's the rub. If a CA issues fraudulent certificates (whether through malicious intent or through poor identity verification) and you trust that CA, you may be fooled into thinking a malicious web site is the real Facebook. That is precisely what happened here. The National Informatics Center, which operates CAs under the Government of India root certificate authority, issued fraudulent certificates for a large number of web properties owned by Google and Yahoo!.

With these fraudulent certificates, a malicious actor could create a spoof of gmail.com (for example), and then engage in what is known as a man-in-the-middle attack. The attacker would sit somewhere between you and the real Gmail; to you, they pretend to be Gmail, while to Gmail they pretend to be you. All the while they get to read everything sent back and forth (including passwords, private email messages, and other sensitive information).

Fortunately the inventors of digital certificates thought of this possibility, and made two ways of addressing bad certificates. These are known as a Certificate Revocation List (CRL), and a Certificate Trust List (CTL). The former is useful when a Certificate Authority needs to cancel a certificate, while the latter is useful if a CA itself is no longer trustworthy.  Chrome, Internet Explorer, Firefox, Safari, and other programs that rely on digital certificates will consult the CRL and the CTL to verify that a certificate presented by a web site is in fact still valid, and is issued by a CA that is trusted. If either case is no longer true, your web browser will display a warning message. Depending on the browser and the settings implemented on your computer or mobile device, you may be able to acknowledge the risk and proceed anyway, or you may be blocked entirely from accessing the web site with the invalid certificate.

The moral of the story? If you see one of the below warning messages, take the warning seriously. Unless you know for absolute certainty that you are visiting the site you intend to visit, and understand the reason that site has an invalid certificate, don't go there.





Do you have something to add? A question you'd like answered? Think I'm out of my mind? Join the conversation below, reach out by email at david (at) securityforrealpeople.com, or hit me up on Twitter at @dnlongen

Whois David?

My photo

I have spent the better part of two decades in information technology and security, with roots in application developer support, system administration, and network security. My specialty is cyber threat intelligence - software vulnerabilities and patching, malware, social networking risks, etc. In particular, I strive to write about complex cyber topics in a way that can be understood by those outside the infosec industry.

Why do I do this? A common comment I get from friends and family is that complex security topics give them headaches. They want to know in simple terms how to stay safe in a connected world. Folks like me and my peers have chosen to make a profession out of hacking and defending. I've been doing this for the better part of two decades, and so have a high degree of knowledge in the field. Others have chosen different paths - paths where I would be lost. This is my effort to share my knowledge with those that are experts in something else.

When not in front of a digital screen, I spend my time raising five rambunctious teens and pre-teens - including two sets of twins. Our family enjoys archery, raising show and meat rabbits, and simply enjoying life in the Texas hill country.

For a decade I served as either Commander or a division leader for the Awana Club in Dripping Springs, Texas; while I have retired from that role I continue to have a passion for children's ministry. At the moment I teach 1st through 3rd grade Sunday School. Follow FBC Dripping Springs Kids to see what is going on in our children's ministries.