[LINK] RFC: Could CAs Be Eavesdropping on Their Clients?

Roger Clarke Roger.Clarke at xamax.com.au
Sat Aug 14 10:02:09 AEST 2010


The NYT story below says that Certificate Authorities (CAs) have 
proliferated to c. 650, and, worse than that, are out of control.

Here follows a quick analysis (off the top of the head, without 
research) on two key aspects of the points made in the article.  I'd 
be delighted if linkers can show me that my analysis is awry.

_____________________________________________________________________

The fundamental function of a CA is to attest to the association 
between a public key and an entity.

1.  Re the Value of a Certificate

Generally:

(a)  few organisations that could be expected to act as CAs actually
      do so.  Possibilities in Australia, for example, include ASIC
      for companies and Medical Registration Board(s) for health care
      professionals
(b)  few organisations that act as CAs are trustworthy
      (Verizon, for heaven's sake??)
(c)  quite limited investment is made by CAs in authenticating the claim
      by the applicant that it really, truly is the entity that it
      represents itself to be.  (There's been talk about enhanced
      authentication processes, including in the article below, but
      I remain sceptical about how much progress has been made)
(d)  the level of assurance provided by CAs to people who rely on the
      certificates that they issue is almost zero

Ergo:  certificates are worth very little, nomatter who issues them.

Ergo:  whether a browser-supplier uses certificates issued by a 
'brandname' organisation like Verizon, or by a twice-removed 
sub-licensee called Dodgy Bros. Ltd, doesn't make much difference to 
the assurance level.

2.  Re Eavesdropping by CAs

"Mr. Eckersley noted that [Dodgy Bros. Ltd] could misuse its position 
to eavesdrop on the activities of Internet users".

I don't get it.  The analysis below explains why.

In order to "eavesdrop" on a channel protected using SSL/TLS, a third 
party needs two things:
(1)  copies of the messages that flow between the two parties
(2)  the key needed to decrypt the messages.  (That's exchanged between
      the parties using a public key-pair owned by one of the parties.
      So the third party needs that particular private key, in order to
      decrypt the key-exchange message and extract the encryption key)

As regards (1), an organisation that provides a CA service would not 
normally be on a traffic-route between its customers.  So the CA 
would have to either contrive to be there, or intrude spyware into 
its client's device in order to get copies of messages.  In either 
case, it would be in serious breach of its role, and quite probably 
of local laws.

As regards (2), an organisation that asks for a certificate from a CA 
provides its public key, but must under no circumstances expose its 
private key - to anyone, least of all the CA.  So the CA would have 
to either trick its client into providing its private key (e.g. by 
offering a key-generation service), or intrude spyware into its 
client's device in order to get a copy of the private key.  In either 
case, it would be in serious breach of its role, and quite probably 
of local laws.

I have no respect for Dodgy Bros Ltd, and little respect for Verizon. 
But is corporate criminality so mainstream that behaviour of this 
kind is actually going on?

_____________________________________________________________________


A Warning About a Weak Link in Secure Web Sites
By MIGUEL HELFT
Published: August 13, 2010
http://www.nytimes.com/2010/08/14/technology/14encrypt.html?_r=2&partner=rss&emc=rss

SAN FRANCISCO - Computer security researchers are raising alarms 
about vulnerabilities in some of the Web's most secure corners: the 
banking, e-commerce and other sites that use encryption to 
communicate with their users.

Those sites, which are typically identified by a closed lock 
displayed somewhere in the Web browser, rely on a third-party 
organization to issue a certificate that guarantees to a user's Web 
browser that the sites are authentic. But as the number of such 
third-party "certificate authorities" has proliferated into hundreds 
spread across the world, it has become increasingly difficult to 
trust that those who issue the certificates are not misusing them to 
eavesdrop on the activities of Internet users, the security experts 
say.

"It is becoming one of the weaker links that we have to worry about," 
said Peter Eckersley, a senior staff technologist at the Electronic 
Frontier Foundation, an online civil liberties group.

The power to appoint certificate authorities has been delegated by 
browser makers like Microsoft, Mozilla, Google and Apple ... to 
various companies, including Verizon.

[The expression 'delegation of power' isn't appropriate.  Less loaded 
would be 'Browser-makers use certificates issued by various 
companies'.]

Those entities, in turn, have certified others, creating a 
proliferation of trusted "certificate authorities," according to 
Internet security researchers.

According to the Electronic Frontier Foundation, more than 650 
organizations can issue certificates that will be accepted by 
Microsoft's Internet Explorer and Mozilla's Firefox, the two most 
popular Web browsers. Some of these organizations are in countries 
like Russia and China, which are suspected to engage in widespread 
surveillance of their citizens.

Mr. Eckersley said Exhibit No. 1 of the weak links in the chain is 
Etisalat, a wireless carrier in the United Arab Emirates that he said 
was involved in the dispute between the BlackBerry maker, Research in 
Motion, and that country over encryption. The U.A.E. threatened to 
discontinue some BlackBerry services because of R.I.M.'s refusal to 
offer a surveillance back door to its customers' encrypted 
communications. Mr. Eckersley also said that Etisalat was found to 
have installed spyware on the handsets of some 100,000 BlackBerry 
subscribers last year. Research in Motion later issued patches to 
remove the malicious code.

Yet Mr. Eckersley noted that Etisalat was one of the "certificate 
authorities" and could misuse its position to eavesdrop on the 
activities of Internet users.

In an open letter signed by Mr. Eckersley, the Electronic Frontier 
Foundation is asking Verizon, which issued Etisalat's power to 
certify Web sites, to consider revoking that authority.

Verizon declined to comment. Etisalat did not respond to an e-mail 
requesting comment.
Mr. Eckersley wrote that Etisalat could issue fake certificates to 
itself for scores of Web sites, including google.com, Microsoft.com 
and Verizon.com, and "use those certificates to conduct virtually 
undetectable surveillance and attacks against those sites." Etisalat 
could also eavesdrop on virtual private networks used by corporations 
to communicate securely around the world, he wrote.

"We believe this situation constitutes an unacceptable security risk 
to the Internet in general and especially to foreigners who use 
Etisalat's data services when they travel," he wrote, adding that the 
foundation did not know whether Etisalat had misused its authority 
yet.

Concerns about certificates have been raised before. When Firefox 
considered granting certificate authority to a Chinese company 
earlier this year, members of the Firefox community worried that the 
company might be pressured by the government to eavesdrop, for 
example, on the Gmail accounts of Chinese dissidents. Eventually, 
Firefox decided to go ahead with the process.

Other security experts said that they were concerned about the 
proliferation of certificate authorities.

"I think it is a really big deal," said Stephen Schultze, associate 
director of the Center for Information Technology Policy at Princeton 
University. Mr. Schultze said that the problem "is not a reason to 
panic and stop doing online banking or e-commerce. But it is bad 
enough problem that it should be receiving a lot more attention and 
we should be trying to fix it."

Some browser makers, however, suggested that while attacks were 
possible in theory, the system had worked reasonably well for more 
than a decade.

"It has proven itself historically to be relatively secure," said 
Johnathan Nightingale, Mozilla's director of Firefox development. Mr. 
Nightingale said that many e-commerce sites were using a new type of 
certificate that required extensive verification. If a certificate 
authority was misusing its power to eavesdrop, he said, a user with 
technical skills could detect the attack, and the organization's 
power to issue certificates would be revoked.


-- 
Roger Clarke                                 http://www.rogerclarke.com/
			            
Xamax Consultancy Pty Ltd      78 Sidaway St, Chapman ACT 2611 AUSTRALIA
                    Tel: +61 2 6288 1472, and 6288 6916
mailto:Roger.Clarke at xamax.com.au                http://www.xamax.com.au/

Visiting Professor in the Cyberspace Law & Policy Centre      Uni of NSW
Visiting Professor in Computer Science    Australian National University



More information about the Link mailing list