Posted by:
admin
13 years, 9 months ago
Background: Comodo, the SSL certificate authority was attacked and fraudulent certificates for a number of high-value sites were issued. Sites like mail.google.com, login.skype.com etc. as well as addons.mozilla.org.
We've known for a long time that the Certificate Authority/Browser trust model is completely broken, filled with externalities and conflicting incentives. We've long theorized that an attack against a Certificate Authority and now here it is. Comodo released an incident report on it. Now, you might expect me to post a rant about the blog post where they stated:
The attacker used the username and password to login to the particular Comodo RA account and effect the fraudulent issue of the certificates.
But, actually, this will not be about how CAs and their partners should use stronger forms of authentication, because there is no way that will occur in any time frame that would benefit enterprise users of certificates. Rather, this is a call for a rational reaction. While Comodo would have you believe that this was a state-sponsored attack by Iran (who then decided not to bother hiding their IP address), it is also likely that the attacker was trying to gather credentials for Google, Yahoo and Microsoft Live that could then be used to attack enterprises.
Many enterprises rely on SSL now for VPN access that it is not going away anytime soon. SSL as a tunnel encryption mechanism works. What doesn't work is: 1.The Certificate Authority system, as proven by the Comodo attack and Moxie Marlinspike's SSLStrip and 2. The reliance on users to make decisions about the validity of certificates.
This is where mutual authentication comes in. Mutual authentication or mutual https authentication means that the SSL server is strongly authenticated to the user. Strongly means cryptographically, not photographically. WiKID's PC tokens can do this by downloading a hash of the targeted site's SSL certificate when it gets the one-time passcode from the WiKID server. Then, before the OTP is presented to the user, the token goes to the targeted site, grabs the cert, hashes it and compares that hash to the one downloaded from the server. If they match, the OTP is presented with the URL and the default browser is launched to the site.
This process is simply an evaluation of whether the certificate has changed from when it was loaded into the server without the need for the user to do so. There are other ways for the to happen, certainly and it's time that enterprises investigate and consider implementing additional https security mechanisms. The key is to eliminate the need for the chain of trust.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)