Bitcoin Forum
May 28, 2024, 05:29:38 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: NSA might have also corrupted US Certificate Authorities  (Read 2532 times)
infested999 (OP)
Hero Member
*****
Offline Offline

Activity: 854
Merit: 500



View Profile
June 16, 2013, 10:00:58 AM
 #1

We know about the wiretapping but I never thought of it like this.

FISA requires all SSL Certificate Authorities (RapidSSL/VeriSign) to cooperate with what they want. This means that the NSA could have created/modified SSL certificates however they like.

If they can do this, that means they could do an SSL man-in-the-middle attack without the (this connection is insecure) warning in your browser, correct?

              ▄███▄   ▄███▄
              █████   █████
      ▄███▄    ▀▀▀     ▀▀▀    ▄███▄
      █████     ▄██▄ ▄██▄     █████
       ▀▀▀ ▄██▄ ▀██▀ ▀██▀ ▄██▄ ▀▀▀
 ▄███▄     ▀██▀           ▀██▀     ▄███▄
 █████ ▄██▄                   ▄██▄ █████
  ▀▀▀  ▀██▀                   ▀██▀  ▀▀▀
                       ▄█
▄███▄ ▄██▄            ███ ███  ▄██▄ ▄███▄
█████ ▀██▀  ████      █████    ▀██▀ █████
 ▀▀▀         ▀███▄    ████           ▀▀▀
       ▄██▄    ████   ███     ▄██▄
 ▄███▄ ▀██▀     ▀███  ███     ▀██▀ ▄███▄
 █████            ███▄██           █████
  ▀▀▀              ▀████            ▀▀▀
                     ███
                     ███
                     ██
                   ███

████    ██
  ████    ██
    ████    ██
      ████    ██
        ████    ██
          ████    ██
          ████    ██
        ████    ██
      ████    ██
    ████    ██
  ████    ██
████    ██










White Paper
Yellow Paper
Pitch Deck
Telegram
LinkedIn
Twitter
mmeijeri
Hero Member
*****
Offline Offline

Activity: 714
Merit: 500

Martijn Meijering


View Profile
June 16, 2013, 10:01:31 AM
 #2

Correct.

ROI is not a verb, the term you're looking for is 'to break even'.
01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
June 16, 2013, 10:02:29 AM
 #3

https://www.grc.com/fingerprints.htm
infested999 (OP)
Hero Member
*****
Offline Offline

Activity: 854
Merit: 500



View Profile
June 16, 2013, 10:06:53 AM
 #4


It says:

Quote
But IF this SSL page was intercepted, its certificate fingerprint will HAVE TO BE DIFFERENT since authentic SSL certificates are impossible to perfectly duplicate.

But they can perfectly duplicate VeriSign/RapidSSL/etc. certificates because they have access to their systems.

              ▄███▄   ▄███▄
              █████   █████
      ▄███▄    ▀▀▀     ▀▀▀    ▄███▄
      █████     ▄██▄ ▄██▄     █████
       ▀▀▀ ▄██▄ ▀██▀ ▀██▀ ▄██▄ ▀▀▀
 ▄███▄     ▀██▀           ▀██▀     ▄███▄
 █████ ▄██▄                   ▄██▄ █████
  ▀▀▀  ▀██▀                   ▀██▀  ▀▀▀
                       ▄█
▄███▄ ▄██▄            ███ ███  ▄██▄ ▄███▄
█████ ▀██▀  ████      █████    ▀██▀ █████
 ▀▀▀         ▀███▄    ████           ▀▀▀
       ▄██▄    ████   ███     ▄██▄
 ▄███▄ ▀██▀     ▀███  ███     ▀██▀ ▄███▄
 █████            ███▄██           █████
  ▀▀▀              ▀████            ▀▀▀
                     ███
                     ███
                     ██
                   ███

████    ██
  ████    ██
    ████    ██
      ████    ██
        ████    ██
          ████    ██
          ████    ██
        ████    ██
      ████    ██
    ████    ██
  ████    ██
████    ██










White Paper
Yellow Paper
Pitch Deck
Telegram
LinkedIn
Twitter
Littleshop
Legendary
*
Offline Offline

Activity: 1386
Merit: 1003



View Profile WWW
June 20, 2013, 02:30:17 AM
 #5


It says:

Quote
But IF this SSL page was intercepted, its certificate fingerprint will HAVE TO BE DIFFERENT since authentic SSL certificates are impossible to perfectly duplicate.

But they can perfectly duplicate VeriSign/RapidSSL/etc. certificates because they have access to their systems.

Not exactly.  GRC is right if there is no cooperation between the intercepted site and the interceptor.  Examples:

Bitcointalk has brand X SSL. 
interceptor has control over brand X SSL authority
Bitcoin talk has still used its own private key that is unknown to EITHER brand X SSL or the interceptor.  The fingerprint would be different.

Google has brand X SSL
interceptor has control over brand x SSL authority
Google GIVES interceptor private key*
The interceptor now has identical fingerprint.

* with this level of cooperation, interceptor could get all the data needed from Google alone without control over SSL authority. 

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!