Bitcoin Forum
May 06, 2024, 07:15:33 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: All SSL Certificates can be spoofed: TURKTRUST  (Read 1325 times)
sounds (OP)
Full Member
***
Offline Offline

Activity: 140
Merit: 100

1221iZanNi5igK7oAA7AWmYjpsyjsRbLLZ


View Profile
January 04, 2013, 03:01:09 AM
Last edit: January 04, 2013, 10:09:56 PM by sounds
 #1

Brian Krebs, former Washington Post reporter, now a recognized blogger in computer security reports:

Turkish Registrar Enabled Phishers to Spoof Google

Turkish government agency spoofed Google certificate "accidentally"

Note that the fake intermediate CA files have been in the wild for 5 months! The ability to impersonate any SSL server is worth in excess of $25,000 on the black market.
1714979733
Hero Member
*
Offline Offline

Posts: 1714979733

View Profile Personal Message (Offline)

Ignore
1714979733
Reply with quote  #2

1714979733
Report to moderator
1714979733
Hero Member
*
Offline Offline

Posts: 1714979733

View Profile Personal Message (Offline)

Ignore
1714979733
Reply with quote  #2

1714979733
Report to moderator
1714979733
Hero Member
*
Offline Offline

Posts: 1714979733

View Profile Personal Message (Offline)

Ignore
1714979733
Reply with quote  #2

1714979733
Report to moderator
There are several different types of Bitcoin clients. The most secure are full nodes like Bitcoin Core, but full nodes are more resource-heavy, and they must do a lengthy initial syncing process. As a result, lightweight clients with somewhat less security are commonly used.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
sounds (OP)
Full Member
***
Offline Offline

Activity: 140
Merit: 100

1221iZanNi5igK7oAA7AWmYjpsyjsRbLLZ


View Profile
January 04, 2013, 03:04:10 AM
Last edit: January 04, 2013, 04:03:54 AM by sounds
 #2

Here's my (poor) attempt to explain what this is all about:

There are fake google.com SSL certificates being used to steal passwords and break into accounts.

Microsoft Security Advisory 2798897: Fraudulent Digital Certificates Could Allow Spoofing

This will probably cause the centralized authority to take further action to restrict the freedom of the net. Proposals like TLSA / CAA put too much power in the hands of the DNS registrars.

This is not the first time the CA trust system for all SSL certificates has been broken wide open. This talk from 28C3 describes another bad one.

Namecoin, despite its weaknesses, might just have a chance!
twolifeinexile
Full Member
***
Offline Offline

Activity: 154
Merit: 100



View Profile
January 29, 2013, 09:16:27 PM
 #3

So if I understand it right, a single point of failure of the current certificate authority structure can make anyone impersonate anyone else ?
sounds (OP)
Full Member
***
Offline Offline

Activity: 140
Merit: 100

1221iZanNi5igK7oAA7AWmYjpsyjsRbLLZ


View Profile
January 29, 2013, 10:53:45 PM
 #4

There are thousands of SSL certificate authorities.

Any of them can issue a valid SSL certificate for any website.

So the current trust system is a single point of failure, yes. Any of the certificate authorities can make a certificate for any website.
theymos
Administrator
Legendary
*
Offline Offline

Activity: 5194
Merit: 12972


View Profile
January 29, 2013, 11:30:51 PM
 #5

The CA system is garbage. I use Certificate Patrol and Perspectives to protect against this kind of thing. I wish I could disable all CAs, but Firefox is bad at handling this.

My favorite idea for replacing the CA system is to put certificates in DNSSEC-protected DNS records. Then only people you have agreements with can screw you: your registrar, register, and ICANN.

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
justusranvier
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009



View Profile
January 30, 2013, 12:45:11 AM
 #6

When I brought this up in the payment protocol thread why was I shouted down for this being a purely theoretical problem?
twolifeinexile
Full Member
***
Offline Offline

Activity: 154
Merit: 100



View Profile
January 30, 2013, 01:04:34 AM
 #7

The CA system is garbage. I use Certificate Patrol and Perspectives to protect against this kind of thing. I wish I could disable all CAs, but Firefox is bad at handling this.

My favorite idea for replacing the CA system is to put certificates in DNSSEC-protected DNS records. Then only people you have agreements with can screw you: your registrar, register, and ICANN.

In this way, CA may not be better than manually confirm each certificate yourself (except maybe first time visit a website and use CA to match the name you want to visit)

Anyway, i never realized this before.
Bit_Happy
Legendary
*
Offline Offline

Activity: 2100
Merit: 1040


A Great Time to Start Something!


View Profile
January 30, 2013, 05:03:12 AM
 #8

1) So a phishing site could have an ssl cert that appears to be Paypal.com (for example), is that a 'practical' use of this info?

2) DNS has been mentioned: If my DNS is secure then people land at the correct site and see my genuine cert. I'm more concerned that the move to TLS1.1 never happened, TLS1.0 is hackable.

theymos
Administrator
Legendary
*
Offline Offline

Activity: 5194
Merit: 12972


View Profile
January 30, 2013, 09:49:21 AM
 #9

1) So a phishing site could have an ssl cert that appears to be Paypal.com (for example), is that a 'practical' use of this info?

That's one concern, but the main concern is that your ISP or someone else between you and PayPal on the network could intercept your PayPal password.

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
twolifeinexile
Full Member
***
Offline Offline

Activity: 154
Merit: 100



View Profile
January 30, 2013, 01:46:35 PM
 #10

1) So a phishing site could have an ssl cert that appears to be Paypal.com (for example), is that a 'practical' use of this info?

That's one concern, but the main concern is that your ISP or someone else between you and PayPal on the network could intercept your PayPal password.

I am sure some one (maybe some government) will do that.
Richy_T
Legendary
*
Offline Offline

Activity: 2436
Merit: 2119


1RichyTrEwPYjZSeAYxeiFBNnKC9UjC5k


View Profile
January 30, 2013, 08:58:31 PM
 #11

The only correct way to do such security is to receive the certificate fingerprint directly from the party or have someone you trust provide it to you.

This is kind-of the way it is done with the CA system except you are trusting the CAs because the browser providers put some default providers in there because... Well, do you know why? Do you know what requirements the browser providers make of the CAs to warrant them giving them your trust by proxy?

The truth is that it's a pretty shoddy system and definitely a result of convenience over security. I still use it because risks are low and I don't consider other options to be realistically worth the hassle. So convenience over security for me too but I'm doing it by choice. There are many (most) people out there who are unaware of the implications.

1RichyTrEwPYjZSeAYxeiFBNnKC9UjC5k
MoneypakTrader.com
Sr. Member
****
Offline Offline

Activity: 472
Merit: 250


Never spend your money before you have it.


View Profile
February 24, 2013, 01:33:55 AM
 #12

And what's the deal with bitcoin.org and the armory site where people getting their bitcoin software from are not using any security/encryption at all to protect the transfer?
Any MITM could interfere to send a malware program instead of the real ones, to steal all the unsuspecting downloader's coin (potentially millions).
Is there any discussion of this lack of security in the heart of BTC?

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!