Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
The Internet Government Networking Security IT

Another CA Issues False Certificates To Iran 229

arglebargle_xiv writes "Following on from Comodogate, we have another public CA issuing genuine false certificates to Iran, this time for Google. There's speculation that it's a MITM by the Iranian government, but given the existing record of CAs ready to sell certs to anyone whose check clears, it could just be another Comodogate." Another (anonymous) reader says, "What might be worrying is that the CA behind the forgery is the official supplier of most Dutch Government certificates, diginotar.nl. They are supposed to be very stringent in their application process. As a Dutchman, I'm very interested to see how this one plays out."
Adds Trailrunner7: "The attack appears to have been targeting Gmail users specifically. Some users trying to reach the Gmail servers over HTTPS found that their traffic was being rerouted through servers that shouldn't have been part of the equation. On Monday afternoon, security researcher Moxie Marlinspike checked the signatures on the certificate for the suspicious server, which had been posted to Pastebin and elsewhere on the Web, and found that the certificate was in fact valid. The attack is especially problematic because the certificate is a wildcard cert, meaning it is valid for any of Google's domains that use SSL."
This discussion has been archived. No new comments can be posted.

Another CA Issues False Certificates To Iran

Comments Filter:
  • by Targen ( 844972 ) on Monday August 29, 2011 @11:54PM (#37249826) Homepage
    Security people have since forever warned the rest of the world against the risks of blindly trusting centralized/hierarchical trust schemes. It's not the first time this happens. It won't be the last. And while standard practices remain as they currently are, we're all in the hands of whoever's got money and power, and governments tend to have a lot of both. Most of you might not care much about this since you probably live in places with decent governments*, but it's a real concern for an enormous portion of the world's population.

    *IN RELATIVE TERMS. I know many of the governments of the "free world" are guilty of all manners of despicable privacy violations with all manners of awful consequences, but please don't even attempt to compare these issues to the sorts of oppression that happen in full-blown totalitarian regimes.
  • by phoxix ( 161744 ) on Monday August 29, 2011 @11:56PM (#37249834)

    The idea behind the "Stringent SSL verification process" is that customers will pay a brand-name-trusted CA company to verify the SSL request is from who they claim to be.

    Even at *TEN THOUSAND* USD/EUR/GBP/etc per fake certificate, the price is too good for countries like Iran, China, etc for engaging in MITM attacks.

    The whole process is a scam outright....

  • by robbak ( 775424 ) on Tuesday August 30, 2011 @12:02AM (#37249876) Homepage

    Surely, if any a fraudulent certificate evert shows up, then the public keys for the issuing CA should be instantly removed? Even if they are Verisign themselves, if a fraudulent certificate exists, then trust is lost, and they cannot remain.

  • lovely (Score:5, Insightful)

    by roman_mir ( 125474 ) on Tuesday August 30, 2011 @04:20AM (#37250882) Homepage Journal

    I love how every [slashdot.org] time [slashdot.org] when the discussion is brought up that browsers need to stop treating https with self signed certificates worse than they treat plain http (just don't show the lock icon, show an icon for the fingerprint, which would make it easy to display the fingerprint for comparing it to a known one), some fool immediately starts talking how browsers must treat https with self signed certs worse than http because https without CA means that your session is vulnerable to the MITM.

    Of-course when it is pointed out [slashdot.org] that CA does not guarantee that there is no MITM either, the discussion dies out but the opinions never change.

    Well how much longer will the opinions can stay the same with all the evidence that CAs do not in fact guarantee that there is no MITM?

    More importantly: who is talking about browser being responsible to figure out whether there is MITM or not with a https and a self signed cert?

    This cognitive dissonance needs to be eradicated.

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...