Protecting Free and Open Communications on the Internet Against Man-In-The-Middle Attacks on Third-Party Software: We’Re FOCI’D

Total Page:16

File Type:pdf, Size:1020Kb

Protecting Free and Open Communications on the Internet Against Man-In-The-Middle Attacks on Third-Party Software: We’Re FOCI’D Protecting Free and Open Communications on the Internet Against Man-in-the-middle Attacks on Third-party Software: We’re FOCI’d Jeffrey Knockel Jedidiah R. Crandall Dept. of Computer Science Dept. of Computer Science University of New Mexico University of New Mexico [email protected] [email protected] Abstract In the context of free and open communications on the Internet (FOCI), it is important for users to be able to pro- In this position paper, we argue that the potential for tect their systems from state actors that control most of man-in-the-middle attacks on third-party software is a the networking infrastructure. It is well known that this significant threat to free and open communications on the control enables man-in-the-middle attacks, and it is also Internet (FOCI). The FOCI community has many chal- known that man-in-the-middle attacks can include at- lenges ahead, from the failure of the SSL system to pro- tacks on the integrity of executable downloads and third- tect Internet users from states that control the Internet party software updates. Our argument in this paper is that to the challenges inherent in measuring and cataloging this kind of attack has the potential to become a persistent Internet censorship. It is already well-known in the com- and widespread threat to free and open communications munity that man-in-the-middle attacks are a threat, and on the Internet, because the vulnerabilities are relatively such attacks are already being used by nation states. easy to find and exploit compared to other types of vul- In this paper we discuss our experiences discovering nerabilities. Because many small, third-party software two vulnerabilities in software update mechanisms (in vendors may be affected, automated tools are needed to Impulse SafeConnect and Sun Java). What surprised us help users protect themselves without relying on the ven- was the relative ease of finding such vulnerabilities and dors. exploiting them. Our argument is that automated tools We will not argue in this paper that the capability to are needed to help users manage this threat more effec- carry out man-in-the-middle attacks is something that tively because the threat involves many third-party appli- state actors will increasingly utilize. We will point out, cations from many small vendors. however, that among the SSL certificates that Iran is suspected to have forged were several software update servers [24]. In this paper we will focus on arguing that typical Internet users are vulnerable to attacks on soft- 1 Introduction ware updates by third-party software. Vulnerabilities in systems will always exist, and there We also will not explore in depth the incentives of ven- will always be so-called “arms races” between attackers dors who do not properly secure their software against and defenders in environments where information secu- man-in-the-middle attacks. It is worth pointing out that rity matters. When large software and communications even the largest vendors can take years to fix known vul- infrastructures are developed over many years and then nerabilities of this type. Apple took more than three suddenly exposed to threats from a new angle that was years to fix the vulnerability in iTunes updates that Fin- never part of the design, however, this moves beyond Fisher exploited [17], and this exploit is believed to have “arms race” and can become a significant source of at- been used against Egyptian dissidents [25]. Microsoft tacks that persists for many years. For example, when was prompted by the Flame worm to fix a vulnerability Windows systems were suddenly thrust onto the Inter- in its Windows update mechanism [18] that was based net with routable IP addresses, it took almost a decade on weaknesses of certificates that use the MD5 hashing before a user could (arguably) put a Windows machine algorithm that had been known for almost four years at on the Internet with a reasonable level of confidence that the time of Microsoft’s fix [21]. These examples were the machine would not be quickly compromised through simply a matter of major vendors not taking the man-in- open ports using memory corruption attacks. the-middle threat seriously enough. Even if the major vendors take this threat seriously, XML-provided hash, and the files are verified to have however, there are many small third party software an “Impulse Point LLC” Authenticode digital signature. vendors whose software performs automatic updates If these verifications pass, then SafeConnect silently re- with administrator privileges. Depending on what the places its files with the downloaded files and restarts it- profile of programs installed on the average user’s com- self. puter is, this problem may run much deeper than Mi- We can exploit this update process via a man-in-the- crosoft and Apple. One of the vulnerabilities we dis- middle attack. We first leverage that SafeConnect only covered and describe in this paper, for example, was uses symmetric encryption to protect its network com- for a software program that is marketed specifically to munication. Thus, by reverse engineering the encryption U.S. universities. Many dissidents, journalists, and oth- key used by a SafeConnect client to decrypt update infor- ers who may be targeted by governments have ties to mation, we also knew the key used to encrypt the update U.S. universities, so even if a software program is used information. We also leverage that we also had analyzed only by a small segment of the population it may still be an older version of SafeConnect, version 4250.121, that a fruitful endeavor for a government to develop a man-in- had a similar update process, that was also signed by the-middle exploit for that software, especially given the Impulse Point, but that performed no digital signature relative ease of finding and exploiting man-in-the-middle verification on updated files. Thus, when SafeConnect vulnerabilities in software updates. attempts to connect to 198.31.193.211, we then exploit To support the statement above that finding and ex- SafeConnect 5036.223 by spoofing an “update” to ver- ploiting this type of vulnerability is relatively easy com- sion 4250.121. After this version is installed, we can then pared to, e.g., 0-day memory corruption vulnerabilities spoof an update containing any arbitrary executable. for web browsers, we first describe two vulnerable third- This vulnerability has been fixed by version 5059.242, party applications. In Section 2, we describe a man-in- which now uses HTTPS to perform all network commu- the-middle vulnerability in Impulse SafeConnect. Safe- nication. However, one must be on-campus to receive Connect is software that many universities require all this update, so, e.g., students who have graduated and users of certain campus networks to install. Then in Sec- moved away will remain vulnerable indefinitely. tion 3 we describe a man-in-the-middle vulnerability in 3 Sun Java a more pervasive program: Sun Java. Section 4 summa- rizes our findings from a few other programs, followed In September 2011, we discovered that the automatic up- by discussion in Section 5, after which we conclude. dater built into Sun Java 6 and 7 for Windows is vulner- able to man-in-the-middle attacks that enable arbitrary 2 Impulse SafeConnect code execution as an Administrator. We will describe the Impulse SafeConnect is software that many universities vulnerability for Java 6 (Java 7’s vulnerability is analo- require users of their networks to download and install as gous). a prerequisite for using the network. It performs network The automatic updater in Java 6 periodically down- access control and can scan a user’s machine for patches, loads update information from the following URL via peer-to-peer activity, and other information. insecure HTTP: In July 2011, we discovered that the automatic up- javadl-esd.sun.com/update/1.6.0/map-m-1.6.0.xml dating built into SafeConnect 5036.223 is vulnerable to man-in-the-middle attacks. When it detects that it has This XML file maps older versions of Java 6 to the URL an Internet connection, SafeConnect attempts to connect of another XML file with update information. For in- to 198.31.193.211, a hard-coded IP address that, when stance, the update information for Java 6 Update 30 to connected to the University’s wireless network, routes to Update 31 is retrieved from the following URL via inse- an on-campus server. If connected, it begins commu- cure HTTP: nicating with the server via XML over insecure HTTP encrypted using the 12-byte Blowfish key in ECB mode: javadl-esd.sun.com/update/1.6.0/au-descriptor-1.6.0_ 31-b79.xml \x4f\xbd\x06\x00\x00\xca \x9c\x18\x03\xfc\x91\x3f This XML file includes a textual description of the up- date presented to the user, a URL used to download the Among other things, information regarding software updater executable and the command-line options with updates is sent by the server to the SafeConnect client, which to execute it, and a hex-encoded SHA1 hash of including the version of the update and both URL’s and the updater executable. hex-encoded MD5 hashes for each updated file. If the If an update is available, then the user is prompted with version is newer than that currently installed, each file the description of the update. If the user accepts the up- is then downloaded, its MD5 hash verified against the date, then the executable is downloaded. Its SHA1 hash is then verified against the XML-provided hash.
Recommended publications
  • RSA-512 Certificates Abused in the Wild
    RSA-512 Certificates abused in the wild During recent weeks we have observed several interesting publications which have a direct relation to an investigation we worked on recently. On one hand there was a Certificate Authority being revoked by Mozilla, Microsoft and Google (Chrome), on the other hand there was the disclosure of a malware attack by Mikko Hypponen (FSecure) using a government issued certificate signed by the same Certificate Authority. That case however is not self-contained and a whole range of malicious software had been signed with valid certificates. The malicious software involved was used in targeted attacks focused on governments, political organizations and the defense industry. The big question is of course, what happened, and how did the attackers obtain access to these certificates? We will explain here in detail how the attackers have used known techniques to bypass the Microsoft Windows code signing security model. Recently Mikko Hypponen wrote a blog on the F-Secure weblog (http://www.f-secure.com/weblog/archives/00002269.html) detailing the discovery of a certificate used to sign in the wild malware. Specifically this malware was embedded in a PDF exploit and shipped in August 2011. Initially Mikko also believed the certificate was stolen, as that is very common in these days, with a large amount of malware families having support, or optional support, for stealing certificates from the infected system. Apparently someone Mikko spoke to mentioned something along the lines that it had been stolen a long time ago. During the GovCert.nl symposium Mikko mentioned the certificate again, but now he mentioned that according to the people involved with investigating the case in Malaysia it likely wasn't stolen.
    [Show full text]
  • Why We Should Consider the Plurality of Hacker and Maker Cultures 2017
    Repositorium für die Medienwissenschaft Sebastian Kubitschko; Annika Richterich; Karin Wenz „There Simply Is No Unified Hacker Movement.“ Why We Should Consider the Plurality of Hacker and Maker Cultures 2017 https://doi.org/10.25969/mediarep/1115 Veröffentlichungsversion / published version Zeitschriftenartikel / journal article Empfohlene Zitierung / Suggested Citation: Kubitschko, Sebastian; Richterich, Annika; Wenz, Karin: „There Simply Is No Unified Hacker Movement.“ Why We Should Consider the Plurality of Hacker and Maker Cultures. In: Digital Culture & Society, Jg. 3 (2017), Nr. 1, S. 185– 195. DOI: https://doi.org/10.25969/mediarep/1115. Erstmalig hier erschienen / Initial publication here: https://doi.org/10.14361/dcs-2017-0112 Nutzungsbedingungen: Terms of use: Dieser Text wird unter einer Creative Commons - This document is made available under a creative commons - Namensnennung - Nicht kommerziell - Keine Bearbeitungen 4.0 Attribution - Non Commercial - No Derivatives 4.0 License. For Lizenz zur Verfügung gestellt. Nähere Auskünfte zu dieser Lizenz more information see: finden Sie hier: https://creativecommons.org/licenses/by-nc-nd/4.0 https://creativecommons.org/licenses/by-nc-nd/4.0 “There Simply Is No Unified Hacker Movement.” Why We Should Consider the Plurality of Hacker and Maker Cultures Sebastian Kubitschko in Conversation with Annika Richterich and Karin Wenz Sebastian Kubitschko is a postdoctoral researcher at the Centre for Media, Communication and Information Research (ZeMKI) at the University of Bremen in Germany. His main research fields are political communication, social movements and civil society organisations. In order to address the relevance of new forms of techno-political civic engagement, he has conducted qualitative, empirical research on one of the world’s oldest and largest hacker organisations, the Chaos Computer Club (CCC).
    [Show full text]
  • TLS Attacks & DNS Security
    IAIK TLS Attacks & DNS Security Information Security 2019 Johannes Feichtner [email protected] IAIK Outline TCP / IP Model ● Browser Issues Application SSLStrip Transport MITM Attack revisited Network Link layer ● PKI Attacks (Ethernet, WLAN, LTE…) Weaknesses HTTP TLS / SSL FLAME FTP DNS Telnet SSH ● Implementation Attacks ... ● Protocol Attacks ● DNS Security IAIK Review: TLS Services All applications running TLS are provided with three essential services Authentication HTTPS FTPS Verify identity of client and server SMTPS ... Data Integrity Detect message tampering and forgery, TLS e.g. malicious Man-in-the-middle TCP IP Encryption Ensure privacy of exchanged communication Note: Technically, not all services are required to be used Can raise risk for security issues! IAIK Review: TLS Handshake RFC 5246 = Establish parameters for cryptographically secure data channel Full handshake Client Server scenario! Optional: ClientHello 1 Only with ServerHello Client TLS! Certificate 2 ServerKeyExchange Certificate CertificateRequest ClientKeyExchange ServerHelloDone CertificateVerify 3 ChangeCipherSpec Finished ChangeCipherSpec 4 Finished Application Data Application Data IAIK Review: Certificates Source: http://goo.gl/4qYsPz ● Certificate Authority (CA) = Third party, trusted by both the subject (owner) of the certificate and the party (site) relying upon the certificate ● Browsers ship with set of > 130 trust stores (root CAs) IAIK Browser Issues Overview Focus: Relationship between TLS and HTTP Problem? ● Attacker wants to access encrypted data ● Browsers also have to deal with legacy websites Enforcing max. security level would „break“ connectivity to many sites Attack Vectors ● SSLStrip ● MITM Attack …and somehow related: Cookie Stealing due to absent „Secure“ flag… IAIK Review: ARP Poisoning How? Attacker a) Join WLAN, ● Sniff data start ARP Poisoning ● Manipulate data b) Create own AP ● Attack HTTPS connections E.g.
    [Show full text]
  • Web and Mobile Security
    Cyber Security Body of Knowledge: Web and Mobile Security Sergio Maffeis Imperial College London bristol.ac.uk © Crown Copyright, The National Cyber Security Centre 2021. This information is licensed under the Open Government Licence v3.0. To view this licence, visit http://www.nationalarchives.gov.uk/doc/open- government-licence/. When you use this information under the Open Government Licence, you should include the following attribution: CyBOK Web & Mobile Security Knowledge Area Issue 1.0 © Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open- government-licence/. The CyBOK project would like to understand how the CyBOK is being used and its uptake. The project would like organisations using, or intending to use, CyBOK for the purposes of education, training, course development, professional development etc. to contact it at [email protected] to let the project know how they are using CyBOK. bristol.ac.uk Web & Mobile Security KA • This webinar covers and complements selected topics from the “Web & Mobile Security Knowledge Area - Issue 1.0” document [WMS-KA for short] • “The purpose of this Knowledge Area is to provide an overview of security mechanisms, attacks and defences in modern web and mobile ecosystems.” • We assume basic knowledge of the web and mobile platforms – The WMS-KA also covers some of the basic concepts assumed here Web and Mobile Security 3 Scope • The focus of WMS-KA is on the intersection of mobile and web security, as a result of recent appification and webification trends. – The KA does not cover specific mobile-only aspects including mobile networks, mobile malware, side channels.
    [Show full text]
  • SSL/TLS Interception Proxies and Transitive Trust Jeff Jarmoc Dell Secureworks Counter Threat Unit℠ Threat Intelligence
    SSL/TLS Interception Proxies and Transitive Trust Jeff Jarmoc Dell SecureWorks Counter Threat Unit℠ Threat Intelligence Presented at Black Hat Europe – March 14, 2012. Introduction Secure Sockets Layer (SSL) [1] and its successor Transport Layer Security (TLS) [2] have become key components of the modern Internet. The privacy, integrity, and authenticity [3] [4] provided by these protocols are critical to allowing sensitive communications to occur. Without these systems, e- commerce, online banking, and business-to-business exchange of information would likely be far less frequent. Threat actors have also recognized the benefits of transport security, and they are increasingly turning to SSL to hide their activities. Advanced Persistent Threat (APT) attackers [5], botnets [6], and even commodity web attacks can leverage SSL encryption to evade detection. To counter these tactics, organizations are increasingly deploying security controls that intercept end- to-end encrypted channels. Web proxies, data loss prevention (DLP) systems, specialized threat detection solutions, and network intrusion prevention systems (NIPS) offer functionality to intercept, inspect, and filter encrypted traffic. Similar functionality is present in lawful intercept systems and solutions enabling the broad surveillance of encrypted communications by governments. Broadly classified as “SSL/TLS interception proxies,” these solutions act as a “man in the middle,” violating the end-to-end security promises of SSL. This type of interception comes at a cost. Intercepting SSL-encrypted connections sacrifices a degree of privacy and integrity for the benefit of content inspection, often at the risk of authenticity and endpoint validation. Implementers and designers of SSL interception proxies should consider these risks and understand how their systems operate in unusual circumstances.
    [Show full text]
  • Cybersecurity Forum Für Datensicherheit, Datenschutz Und Datenethik 23
    3. JAHRESTAGUNG CYBERSECURITY FORUM FÜR DATENSICHERHEIT, DATENSCHUTZ UND DATENETHIK 23. APRIL 2020, FRANKFURT AM MAIN #cyberffm Premium-Partner: Veranstaltungspartner: 3. JAHRESTAGUNG CYBERSECURITY DEUTSCHLAND — DIGITAL — SICHER — BSI Die Schadsoftware »Emotet« hat uns in den letzten Wochen und Monaten erneut schmerzhaft vor Augen geführt, welche Auswirkungen es haben kann, wenn man die Vorteile der Digitalisierung genießt, ohne die dafür unabdingbar notwendige Infor- mationssicherheit zu gewährleisten. Stadtverwaltungen, Behörden, Krankenhäuser und Universitäten wurden lahmgelegt, Unternehmen mussten zeitweise den Betrieb einstellen. Die Folgen sind für jeden von uns spürbar: Arbeitsplätze sind in Gefahr, Waren und Dienstleistungen können nicht mehr angeboten und verkauft werden, Krankenhäuser müssen die Patientenannahme ablehnen. Stadtverwaltungen sind nicht mehr arbeitsfähig und schließen ihre Bürgerbüros. Bürgerinnen und Bürger konnten keine Ausweise und Führerscheine beantragen, keine Autos anmelden und keine Sperrmüllabfuhr bestellen. Sogar Hochzeiten mussten verschoben werden. Und wie würde die Lage wohl erst aussehen, wenn wir tatsächlich in einer voll digitalisierten Welt lebten? Das BSI beschäftigt sich damit, in welchen Anwendungsfeldern der Digitalisierung Risiken entstehen könnten und wie wir diese Risiken kalkulierbar und beherrschbar machen können. Unsere Stärke ist es, Themen der Informationssicherheit gebündelt fachlich zu analysieren und aus der gemeinsamen Analyse heraus konkrete Angebote für unterschiedliche Zielgruppen
    [Show full text]
  • Certificate Transparency: New Part of PKI Infrastructure
    Certificate transparency: New part of PKI infrastructure A presentation by Dmitry Belyavsky, TCI ENOG 7 Moscow, May 26-27, 2014 About PKI *) *) PKI (public-key infrastructure) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates Check the server certificate The server certificate signed correctly by any of them? Many trusted CAs NO YES Everything seems to We warn the user be ok! DigiNotar case OCSP requests for the fake *.google.com certificate Source: FOX-IT, Interim Report, http://cryptome.org/0005/diginotar-insec.pdf PKI: extra trust Independent Trusted PKI source certificate DANE (RFC 6698) Certificate pinning Limited browsers support Mozilla Certificate Patrol, Chrome cache for Google certificates Certificate transparency (RFC 6962) Inspired by Google (Support in Chrome appeared) One of the authors - Ben Laurie (OpenSSL Founder) CA support – Comodo Certificate Transparency: how it works • Log accepts cert => SCT Client • Is SCT present and signed correctly? Client • Is SCT present and signed correctly? Auditor • Does log server behave correctly? Monitor • Any suspicious certs? Certificate Transparency: how it works Source: http://www.certificate-transparency.org Certificate Transparency how it works Source: http://www.certificate-transparency.org Certificate Transparency current state Google Chrome Support (33+) http://www.certificate-transparency.org/certificate-transparency-in-chrome Google Cert EV plan http://www.certificate-transparency.org/ev-ct-plan Certificate Transparency current state Open source code 2 pilot logs Certificate Transparency: protect from what? SAVE from MITM attack ü Warning from browser ü Site owner can watch logs for certs Do NOT SAVE from HEARTBLEED! Certificate transparency and Russian GOST crypto Russian GOST does not save from the MITM attack Algorithm SHA-256 >>> GOSTR34.11-2012 Key >>> GOST R 34.10-2012 Q&A Questions? Drop ‘em at: [email protected] .
    [Show full text]
  • Security Economics in the HTTPS Value Chain
    Security Economics in the HTTPS Value Chain Hadi Asghari*, Michel J.G. van Eeten*, Axel M. Arnbak+ & Nico A.N.M. van Eijk+1 * [email protected], [email protected] Delft University of Technology, Faculty of Technology Policy and Management + [email protected], [email protected] University van Amsterdam, Faculty of Law, Institute for Information Law Abstract. Even though we increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. We present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication model could be addressed. We conceptualize the security issues from the perspective of the HTTPS value chain. We then discuss the breaches at several Certificate Authorities (CAs). Next, we explore the security incentives of CAs via the empirical analysis of the market for SSL certificates, based on the SSL Observatory dataset. This uncovers a surprising pattern: there is no race to the bottom. Rather, we find a highly concentrated market with very large price differences among suppliers and limited price competition. We explain this pattern and explore what it tells us about the security incentives of CAs, including how market leaders seem to benefit from the status quo. In light of these findings, we look at regulatory and technical proposals to address the systemic vulnerabilities in the HTTPS value chain, in particular the EU eSignatures proposal that seeks to strictly regulate HTTPS communications. Keywords: HTTPS, Cybersecurity, Internet Governance, Constitutional Values, E-Commerce, Value Chain Analysis, Security Economics, eSignatures Regulation, SSL, TLS, Digital Certificates, Certificate Authorities.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • The State of SSL Security
    THE STATE OF SSL SECURITY SSL OF STATE THE White Paper The State of SSL Security Why Secure Sockets Layer Certificates Remain Vital to Online Safety The State of SSL Security: Why Secure Sockets Layer Certificates Remain Vital to Online Safety The State of SSL Security Contents What SSL is—and why it matters . .3 . Different levels of validation, different levels of trust . .4 . SSL under siege. 5 Emerging SSL trends: protecting the fragile trust ecosystem. 6 Why working with a trusted, industry-leading vendor is critical . 8. Conclusion . 9 The State of SSL Security: Why Secure Sockets Layer Certificates Remain Vital to Online Safety Without adequate security, online transactions—and the Internet as we know it— could not serve as a feasible platform for global commerce, transmission of data, or the sharing of reliable information. SSL security is the easiest, most cost-effective way to provide that strong protection. Yet high-profile SSL hacking incidents have filled the news headlines recently. Poor security practices by secure sockets layer (SSL) Certificate Authorities (CAs), coupled with persistent outcries from industry detractors that the CA model is no longer viable, caused the digital certificate to have a challenging year in 2011. But SSL itself is not the problem. Rather, the culprits tend to be weak validation, lax oversight of third-party authenticating entities, failure to use best practices to secure facilities, or other factors that are less a matter of the technology than of operator error. SSL itself is still critical to keeping online transactions safe. The real issue is that businesses considering SSL should remember that their choice of vendor matters—significantly.
    [Show full text]
  • Legacy of Heartbleed: MITM and Revoked Certificates
    Legacy of Heartbleed: MITM and Revoked Certificates Alexey Busygin [email protected] NeoBIT Notable Private Key Leaks • 2010 – DigiCert Sdn Bhd. issued certificates with 512-bit keys • 2012 – Trustwave issued CA certificate for one of its customers DLP system • 2013 – DigiNotar CA was totally compromised • 2014 – Heartbleed bug caused certificate revocation storm. 500000+ certs to be revoked • 2015 – RSA-CRT private key leaks • 2017 – Cloudbleed bug in Cloudflare reverse proxies 2 Checking Certificate Revocation Status: Certificate Revocation Lists (CRL) • CAs publish CRLs – lists of revoked certificate serial numbers • Normally certificate contains URL of the corresponding CRL Why it’s not OK? CRLs are not appropriate for online checks: • Excess size (up to 1 MB) • Vulnerable to replay attacks 3 Checking Certificate Revocation Status: Online Certificate Status Protocol (OCSP) • CAs maintain OCSP responders answering with certificate revocation status • Normally certificate contains URL of the OCSP responder • OCSP provides optional replay attack protection Why it’s not OK? • Slows down connection establishment • Browsing history leaks to CA • OCSP responder is DDoS target 4 Checking Certificate Revocation Status: OCSP Stapling • No browsing history leaks • Choose one: o Replay attack protection o TLS server side OCSP response caching: Minimal impact on connection establishment time Reduced load on OCSP responder Why it’s not OK? • Stapled OCSP responses are optional and may be stripped by MITM • OCSP responder is DDoS target (if replay
    [Show full text]
  • Hacktivism Cyberspace Has Become the New Medium for Political Voices
    White Paper Hacktivism Cyberspace has become the new medium for political voices By François Paget, McAfee Labs™ Table of Contents The Anonymous Movement 4 Origins 4 Defining the movement 6 WikiLeaks meets Anonymous 7 Fifteen Months of Activity 10 Arab Spring 10 HBGary 11 The Sony ordeal 11 Lulz security and denouncements 12 Groups surrounding LulzSec 13 Green rights 14 Other operations 15 AntiSec, doxing, and copwatching 16 Police responses 17 Anonymous in the streets 18 Manipulation and pluralism 20 Operation Megaupload 21 Communications 21 Social networks and websites 21 IRC 22 Anonymity 23 DDoS Tools 24 Cyberdissidents 25 Telecomix 26 Other achievements 27 Patriots and Cyberwarriors 28 Backlash against Anonymous 29 TeaMp0isoN 30 Other achievements 30 Conclusion 32 2 Hacktivism What is hacktivism? It combines politics, the Internet, and other elements. Let’s start with the political. Activism, a political movement emphasising direct action, is the inspiration for hacktivism. Think of Greenpeace activists who go to sea to disrupt whaling campaigns. Think of the many demonstrators who protested against human rights violations in China by trying to put out the Olympic flame during its world tour in 2008. Think of the thousands of activists who responded to the Adbusters call in July 2011 to peacefully occupy a New York City park as part of Occupy Wall Street. Adding the online activity of hacking (with both good and bad connotations) to political activism gives us hacktivism. One source claims this term was first used in an article on the filmmaker Shu Lea Cheang; the article was written by Jason Sack and published in InfoNation in 1995.
    [Show full text]