This is a mirror of official site: http://jasper-net.blogspot.com/

EFF uncovers further evidence of SSL CA bad behavior

| Sunday, April 10, 2011
In the wake of the Comodo SSL Certificate Authority (CA) having been compromised by an Iranian hacker the Electronic Frontier Foundation published more evidence of problems in the SSL signing industry.

While many were critical of Comodo's hard coding passwords into public facing code and using their root certificate to sign certificates, now there is more evidence of industry-wide lax practices.

Chris Palmer wrote a blog on Tuesday outlining work the EFF had done analyzing the quantity of certificates that were signed and trusted by all of our browsers that were technically invalid and could be used for fraud.

The particular practice the EFF was looking for was the signing of certificates that did not contain fully-qualified domain names.

To obtain verification of your identity for the CA to sign a certificate, the certificate must contain something that globally only you could be identified by.

If I try to get a certificate for just plain www, I should be rejected. Yet if I try to purchase secure.sophos.com, you could verify that I am allowed to represent Sophos, and that this certificate would not be valid for any other organization.

So what did the EFF find? They found that certificate authorities have signed over 37,000 certificates that are not specific to any organization, they contain only a hostname. The worst offender was GoDaddy.com.

Each and every one of these could be used to impersonate some local server on your intranet by an intruder...

Wait! It gets worse.. 28 Extended Validation certificates were issued in this manner.. 10 of which are still valid.

Read more: Naked security

Posted via email from Jasper-net

0 comments: