[LINK] A Potage of CAs, or Why PKI Doesn't Work
Roger Clarke
Roger.Clarke at xamax.com.au
Fri Sep 2 07:52:19 AEST 2011
http://www.slate.com/id/2265204/
> ... some ... certificate authorities have decided to delegate their
>powers to yet more organizations, which aren't tracked or audited by
>browser companies. By scouring the Net for certificates, security
>researchers have uncovered more than 600 groups who, through such
>delegation, are now also automatically trusted by most browsers,
>including the Department of Homeland Security, Google, and Ford
>Motors-and a UAE mobile phone company called Etisalat.
>
>In 2005, a company called CyberTrust-which has since been purchased
>by Verizon- gave Etisalat, the government-connected mobile company
>in the UAE, the right to verify that a site is valid. Here's why
>this is trouble: Since browsers now automatically trust Etisalat to
>confirm a site's identity, the company has the potential ability to
>fake a secure connection to any site Etisalat subscribers might
>visit using a man-in-the-middle scheme.
>
>Etisalat doesn't exactly have a clean record when it comes to
>privacy. Tech watchdogs have already caught it deliberately
>attempting to invade the privacy of its own users. In July 2009,
>Etisalat abruptly announced a software update on all its BlackBerry
>customers. Described as a "network upgrade," the application in fact
>copied all messages written on the device to two private Etisalat
>e-mail addresses. Research in Motion distanced itself from this
>clumsy attempt at government spyware, clarifying that it was "not a
>RIM-authorized software upgrade" and providing a counter-app to
>remove the program.
>
>To date, no one has observed Etisalat fake a Web site to spy on an
>individual's encrypted traffic. But because of the proliferation and
>delegation of certificate authorities, Etisalat and hundreds of
>other groups have that capability. The good news about misusing the
>power of certificate authorities is that, like the BlackBerry
>upgrade, such attacks can quickly be uncovered and publicized, given
>enough vigilance and the right tools.
>
>A better solution is to clean up the certificate authority lists and
>revoke the rights of organizations who could abuse it. The
>Electronic Frontier Foundation, where I used to work, recently
>published an open letter to Verizon asking them to consider publicly
>revoking the certificate authority that the company granted
>Etisalat. But that still leaves the hundreds of other certificate
>authorities that could turn rogue and start spying on the Web's
>secure systems.
Full article below.
The Internet's Secret Back Door
Web users in the United Arab Emirates have more to worry about than
having just their BlackBerries cracked.
By Danny O'Brien
Slate
Posted Friday, Aug. 27, 2010, at 2:56 PM ET
http://www.slate.com/id/2265204/
The United Arab Emirates continues to wrestle with Research in Motion
over government access to BlackBerry messages, threatening to ban the
company's services if it doesn't severely weaken the anti-snooping
protections on its smartphones. But years before the RIM battle
boiled over, other Western companies handed the country a far greater
power: the capability to infiltrate the secure system used by most
banking, mail, and financing sites, making the most protected data on
the Web available to the prying eyes of the emirates'
government-connected telecommunications giant.
To understand how this happened, you need to understand the way much
of the Web's private traffic stays private. Whenever you're sending
sensitive information online-say, your credit card number to Amazon
or a message over Gmail-the content is encrypted before being sent
and then decrypted by the Web site you sent it to. (Sites using this
secure mode have URLs that start with "https," and browsers add a
padlock icon as well to demonstrate you're communicating securely.)
Every vendor has its own rules for how to scramble information so
that only it, the intended recipient, can decode it. If anyone
intercepts the message along the way, it will appear to be a
meaningless digital jumble.
Cryptographers are reasonably confident that the mathematics behind
this method of encryption makes it unassailable by direct assault,
even by the most well-funded intelligence agencies. But they have
also long been aware of a potential weakness in its design: There's
no way for your computer to know if the recipient is who they say
they are. Because of this, cyber-criminals (or curious governments)
can trick you by staging a "man in the middle attack," where the
snoop acts as an uninvited mediator between you and the intended
recipient. Your computer thinks it's contacting your bank when in
fact it's contacting the snoop, using his own rules for encrypting
information. He decodes it, copies your sensitive data, then
re-encodes it according to the bank's rules and sends it along. He
does the same thing for traffic coming from the bank to you. Both
your bank and you would believe you were talking directly to each
other with no one else listening.
To overcome this deficiency, the Web's security relies on the idea of
"certificate authorities": organizations that independently verify
the identity of the Web site you're communicating with and provide a
digital confirmation that it's authentic. A certificate authority's
digital endorsement decides whether your browser believes a site when
it claims to be GMail, Microsoft, or even the New York Times, which
has a secure version. Middle men can't fake this authentication
without getting a similar endorsement. These certificate authorities
are supposed to conduct due diligence in ensuring that only the real
Web site gets their stamps of approval.
Who are these certificate authorities? At the beginning of Web
history, there were only a handful of companies, like Verisign,
Equifax, and Thawte, that made near-monopoly profits from being the
only providers trusted by Internet Explorer or Netscape Navigator.
But over time, browsers have trusted more and more organizations to
verify Web sites. Safari and Firefox now trust more than 60 separate
certificate authorities by default. Microsoft's software trusts more
than 100 private and government institutions.
Disturbingly, some of these trusted certificate authorities have
decided to delegate their powers to yet more organizations, which
aren't tracked or audited by browser companies. By scouring the Net
for certificates, security researchers have uncovered more than 600
groups who, through such delegation, are now also automatically
trusted by most browsers, including the Department of Homeland
Security, Google, and Ford Motors-and a UAE mobile phone company
called Etisalat.
In 2005, a company called CyberTrust-which has since been purchased
by Verizon- gave Etisalat, the government-connected mobile company in
the UAE, the right to verify that a site is valid. Here's why this is
trouble: Since browsers now automatically trust Etisalat to confirm a
site's identity, the company has the potential ability to fake a
secure connection to any site Etisalat subscribers might visit using
a man-in-the-middle scheme.
Etisalat doesn't exactly have a clean record when it comes to
privacy. Tech watchdogs have already caught it deliberately
attempting to invade the privacy of its own users. In July 2009,
Etisalat abruptly announced a software update on all its BlackBerry
customers. Described as a "network upgrade," the application in fact
copied all messages written on the device to two private Etisalat
e-mail addresses. Research in Motion distanced itself from this
clumsy attempt at government spyware, clarifying that it was "not a
RIM-authorized software upgrade" and providing a counter-app to
remove the program.
To date, no one has observed Etisalat fake a Web site to spy on an
individual's encrypted traffic. But because of the proliferation and
delegation of certificate authorities, Etisalat and hundreds of other
groups have that capability. The good news about misusing the power
of certificate authorities is that, like the BlackBerry upgrade, such
attacks can quickly be uncovered and publicized, given enough
vigilance and the right tools.
A better solution is to clean up the certificate authority lists and
revoke the rights of organizations who could abuse it. The Electronic
Frontier Foundation, where I used to work, recently published an open
letter to Verizon asking them to consider publicly revoking the
certificate authority that the company granted Etisalat. But that
still leaves the hundreds of other certificate authorities that could
turn rogue and start spying on the Web's secure systems.
Ironically, RIM's enterprise BlackBerry encryption is one of the few
secure Internet communication channels that doesn't depend on
certificate authorities, which could be one of the reasons the UAE is
so obsessed with cracking it. RIM's defense against the UAE's demands
is that corporations and individuals expect the same level of privacy
in their BlackBerry communications as they get from any other
Internet service. "Everything on the Internet is encrypted," CEO
Michael Lazaridis told the Wall Street Journal, slightly
inaccurately. "This is not a BlackBerry-only issue. If they can't
deal with the Internet, they should shut it off." What's worrying is
that the UAE may indeed have already "dealt with" the rest of the
Internet-just not in the way that most of us would like.
--
Roger Clarke http://www.rogerclarke.com/
Xamax Consultancy Pty Ltd 78 Sidaway St, Chapman ACT 2611 AUSTRALIA
Tel: +61 2 6288 1472, and 6288 6916
mailto:Roger.Clarke at xamax.com.au http://www.xamax.com.au/
Visiting Professor in the Cyberspace Law & Policy Centre Uni of NSW
Visiting Professor in Computer Science Australian National University
More information about the Link
mailing list