Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security The Internet IT

SSL Still Mostly Misunderstood, Even By the Pros 292

An anonymous reader writes "People still don't understand SSL. This isn't much of a surprise... no one expects that grandma and grandpa know what SSL is and what it does. What is surprising and downright scary is that most IT professionals don't understand SSL, and many consider it to be the be-all, end-all of security in their organization. With all the tools out there to manipulate SSL connections, and the browser vendors unable to settle on a single method of showing if a site is secured by SSL or not, is it any wonder that no one gets it?"
This discussion has been archived. No new comments can be posted.

SSL Still Mostly Misunderstood, Even By the Pros

Comments Filter:
  • by Eggplant62 ( 120514 ) on Monday October 12, 2009 @07:17AM (#29717299)

    Who proofreads these article submissions, anyway? Does anyone?

  • by QuantumG ( 50515 ) * <qg@biodome.org> on Monday October 12, 2009 @07:19AM (#29717309) Homepage Journal

    If you want to write a pretentious article about how people don't understand security of the interwebs, at least get the name right [wikipedia.org]. That's right, SSL hasn't been considered "secure" for at least a decade.

    • Re: (Score:3, Insightful)

      by frozentier ( 1542099 )
      If you want to write a pretentious article, AT LEAST use correct spelling and grammar if nothing else.
    • by Anonymous Coward on Monday October 12, 2009 @07:29AM (#29717369)

      The article isn't even just pretentious, it's just pointless fluff. The entire thing could have been summarized as "many customers ignore security warnings in browsers and many web developers deploy SSL/TSL in vaguely unacceptable ways which we won't even begin to explain here".

      Really, that article couldn't have been more pointless. WHAT are people doing that they shouldn't be? WHAT are people expecting SSL to do that it doesn't? If you're going to write an article about people's misconceptions of a technology, you could at least spend a single sentence explaining what some of those misconceptions are.

      Pointless and uninformative article is pointless and uninformative.

    • by something_wicked_thi ( 918168 ) on Monday October 12, 2009 @07:32AM (#29717387)

      If you want to write a pretentious response to a pretentious article, try reading the source you're linking to. SSL v2 hasn't been secure for a while, but SSL v3 is fine.

      • by Antique Geekmeister ( 740220 ) on Monday October 12, 2009 @08:11AM (#29717651)

        No, I'm afraid it's not. It's still vulnerable to "Do you accept this made-up key" attacks where people have become far too accustomed to accepting unsigned keys, and to the purchase of centrally signed keys. Because the key signatures belong to a central signing authorities that rely on valid credit cards, not personal authentication, there is still only a pretense at genuine security.

        There have been other tools proposed to address these issues, such as the PGP web-of-trust, and the Palladium project's hardware encryption, but they've broken down in practice on the problem of US encryption export regulations, poor closed source implementation that turns out to be easily virtualized, and many essentially social rather than technological issues. Even SSL was handicapped for years by the USA's insane 80-bit limit for SSL in exported software.

        • by muckracer ( 1204794 ) on Monday October 12, 2009 @08:24AM (#29717805)

          > Even SSL was handicapped for years by the USA's insane 80-bit limit for SSL
          > in exported software.

          It was 40-bits. Agree with your point...just sayin'.

        • by rgviza ( 1303161 ) on Monday October 12, 2009 @08:46AM (#29718051)

          >No, I'm afraid it's not. It's still vulnerable to "Do you accept this made-up key" attacks where people have become far too accustomed to accepting unsigned keys, and to the purchase of centrally signed keys

          Um, that's a social engineering attack, not a fault of the protocol itself. The protocol is secure, users aren't. To be fair, the browser manufacturers could do a better job of writing the warnings so that anyone could understand them. Again, this is not a fault of the protocol, rather how people use it.

          And adding a layer of PGP to it, would have the _exact_ same issue. Instead of "Do you accept this SSL key" It would be "Do you accept this PGP key". In addition, adding PGP would introduce a whole new slew of security bugs related to added complexity of PGP support in browsers, along with all the bugs guaranteed to be introduced with the additional new code.

          No thanks =D.

          • It's a social engineering attack, yes. It's one that is built into the current implementation of SSL: the central key authority has been over-trusted, and signed keys are far too easy to obtain.

            And I'm sorry that I was confusing. It's not PGP that I was referring to as useful, but rather PGP's 'web-of-trust', where people whom you know personally sign keys for others whom they know personally, and you can trace that web to see who knows the final target's key owner. From my observation of the behavior of Ve

        • Re: (Score:2, Funny)

          It seems you've all proved the article's point. SSL still mostly misunderstood.
        • by Yvanhoe ( 564877 )
          All I need for a web of trust to work, it that CowboyNeal begins signing SSL certificates.
    • by WD ( 96061 ) on Monday October 12, 2009 @07:42AM (#29717435)

      The correct term is "HTTPS". HTTPS, which can use various versions of SSL or TLS, is still mostly understood. Even by the pros.

    • TLS 1.0 is based on SSL v3. TLS 1.0 is also called SSL 3.1 sometimes.
      There isn't really a huge difference between TLS & SSL 3.0.

  • by Anonymous Coward

    SSL is no more for 10 years.

    You have to copy TLS 1000 times on the blackboard :
    http://en.wikipedia.org/wiki/Transport_Layer_Security
    http://tools.ietf.org/html/rfc2246

  • Forcing people to implement both privacy and authentication in one package is half the problem with SSL. For most sites, it's more important to know that the site you're visiting is the same site you visited last time, than knowing that foo.example.com has a signed certificate approved by someone you never heard of. If these two functionalities were separated, so the browser just checked that a "non-certified" site's encryption key hadn't changed and let you through without comment if that was the case, then most sites using old or self-signed certificates would just use the encryption layer, and browsers COULD block access to sites with invalid certificates without causing people so much inconvenience they'd want to switch to a different browser that was less picky.

    (yes, I know that this would probably be implemented using self-signed certificates, but it could be presented to the user as a "low security" site with an appropriate icon and at most a comment that "you haven't visited XXXX.example.com before, it is a low security site..." the first time you see it)

    • by Lennie ( 16154 )
      The problem with this is, certificates expire.
      • by argent ( 18001 )

        Self-signed certificates can be regenerated automatically, or simply set to have a renewal date after the world ends in 2038.

    • by Drencrom ( 689725 ) <jorge@nOsPaM.merlino.uy> on Monday October 12, 2009 @07:58AM (#29717517) Journal
      Totally agree with this. If I dont want to spend money paying a certification authority I should be able to encrypt anyway without the browser warning the user in big red letters that I am a pirate. Firefox warnings are geting worse in each version and, for the user perspective, it seems that encrypting with a non official certificate is much worse than not encrypting at all. By the way I use cacert [cacert.org] to generate my certificates; it should be inlcuded in the default Firefox certification authorities list. I suspect there is money involved in getting into that list though.
      • Bug 215243 (Score:5, Informative)

        by tepples ( 727027 ) <.tepples. .at. .gmail.com.> on Monday October 12, 2009 @08:19AM (#29717747) Homepage Journal

        By the way I use cacert to generate my certificates; it should be inlcuded in the default Firefox certification authorities list. I suspect there is money involved in getting into that list though.

        CAcert failed a DRC audit. Bug 215243 comment 158 [mozilla.org] has the details.

      • Totally agree with this. If I dont want to spend money paying a certification authority I should be able to encrypt anyway without the browser warning the user in big red letters that I am a pirate.

        Except, if you don't verify the identity of the recipient, encrypting data is as much use as putting a steel door on a tent. Maybe that's why encryption and authentication are joined at the hip?

        The behaviour of Firefox is absolutely correct: it strongly discourages people who don't know any better from connecting to unverified sites, but does not prevent it.

        If you want to run an encrypted site without shelling out for a certificate, then fine - but its up to you to reassure visitors that you're not evil.

        • by argent ( 18001 )

          If you want to run an encrypted site without shelling out for a certificate, then fine - but its up to you to reassure visitors that you're not evil.

          There's nothing stopping an evil company from getting a certificate. Consider Microsoft as an example. Or Verisign. Or Aristotle.

          What you mean to say is "it's up to you to convince your visitors that you're who you say you are".

          If all I'm saying is "I'm a video game web forum" then my visitors don't need anything more than "I'm using the same self-signed certif

          • by dkf ( 304284 )

            If all I'm saying is "I'm a video game web forum" then my visitors don't need anything more than "I'm using the same self-signed certificate I used the last time".

            Frankly, a video game web forum doesn't need encryption except for the matter of identifying users, and something like OpenID could be used for that.

            • If all I'm saying is "I'm a video game web forum" then my visitors don't need anything more than "I'm using the same self-signed certificate I used the last time".

              Frankly, a video game web forum doesn't need encryption except for the matter of identifying users, and something like OpenID could be used for that.

              I thought the goal was to have everything encrypted, regardless of whether it's illegal and needs to be hidden, if for no other reason than to mildly annoy the NSA.

          • by vadim_t ( 324782 )

            Any company can get a cert.

            What's important is that they're not supposed to be able to get one for a domain not of their own. So for instance, a Microsoft employee can't get a cert for paypal.com then sit somewhere between your network and the internet and perform a man in the middle attack.

            • Re: (Score:3, Insightful)

              by argent ( 18001 )

              Where have I suggested that Paypal should use self-signed certs?

              The point is that there's thousands of sites... no, hundreds of thousands... that are wide open for sniffing that would be using TLS if it was possible to set it up as easily as you can set up SSH. This possibly didn't used to be an issue but is getting more so as more and more businesses provide things like free wifi.

              For these sites the same level of authentication as SSH, "this is the same server as you visited last time", is adequate to dete

              • by vadim_t ( 324782 )

                Here's a question:

                When you're ssh-ing into your computer, how many precautions do you take?

                Do you never, ever ssh from a device you don't personally trust completely?
                Do you remember or have written down your SSH server's fingerprint so that you can tell it's the right one?
                If you for instance go on vacation, ssh from your laptop to your server and get the wrong fingerprint, do you abort and wait until you get home to sort it out?

                If you said no to any of these, you're not really very secure.

                I do all these thi

        • by smoker2 ( 750216 )

          The real problems are that (a) its such a hassle to drill down to the name of the certificate holder and (b) when you do find it its usually something like "No Obvious Connection to the Website Corp. (Holdings) PLC". (the extended ID in Firefox helps, where its used).

          It is not a hassle to "drill down" to find the name of the cert holder. Firefox puts it right there on the front of the security popup. And most verified certs are verified to some unknown corporate division anyway - I don't see your point.

          As

        • Re: (Score:3, Interesting)

          by DavidTC ( 10147 )

          Except, if you don't verify the identity of the recipient, encrypting data is as much use as putting a steel door on a tent.

          You know, you hit that analogy perfectly, but apparently did not bother think about it.

          A steel door on a tent is much better than no door on a tent.

          Let me guess: You think locking a car or house is a waste of time, because any fool can break in via windows? You think it would be better if we couldn't lock our car or house, because locking it gives us a false sense of security?

          Per

      • by Hatta ( 162192 ) *

        What use is encryption if you can't guarantee that there's not a man in the middle? This is why self-signed certs are a bad idea. That is, unless you want your users calling you up to manually verify your key.

        • by argent ( 18001 )

          What use is encryption if you can't guarantee that there's not a man in the middle?

          Unless your very first connection to the website and EVERY subsequent connection was intercepted by the SAME attacker, for every person in a position to detect the fraud, for the entire duration of the scam, simply verifying that the certificate is the same as the last time provides sufficient authentication to deter all but the most dedicated attacker.

          So... sites where significant assets are involved would not use self-signe

        • What use is encryption if you can't guarantee that there's not a man in the middle? This is why self-signed certs are a bad idea. That is, unless you want your users calling you up to manually verify your key.

          Or using something like Perspectives [cmu.edu] to get much the same effect.

      • Re: (Score:2, Flamebait)

        Firefox warnings are geting worse in each version and, for the user perspective, it seems that encrypting with a non official certificate is much worse than not encrypting at all. .... I suspect there is money involved in getting into that list though.

        The only sane reason I can come up with for the continuing insanity of the Firefox self signed cert warnings is direct kickbacks to the Mozilla foundation from Verisign and the like. I have little doubt that at the very least, "consultation" with Verisign and

    • by smoker2 ( 750216 )
      The main problem with "secure" sites is that too many people don't realise that the site is not what is secured. It is only the connection to the site that is encrypted, the server itself could be sitting in a room full of chinese hackers for all you know. Too many sites mention their "secure server" when in actual fact the machine is sat in a rack with thousands of other machines surrounded by minimum wage techs.

      My open university course makes this mistake right at the beginning. It specifically says that
  • by Malc ( 1751 ) on Monday October 12, 2009 @07:58AM (#29717521)

    Have you ever tried teaching yourself the basics behind SSL, such as PKI and X.509 certificates? In an industry full of jargon and technalese, the security people are some of the worst for explaining things. The documentation out there is poor and cryptic. Ever wonder why encrypted or signed email never took off? Look no further than GnuPG or the Enigmail plug-in for Mozilla. Try finding out what DER encoding is, or ASC.1, or what PKCS#7 means. None of it's straight-forward, even for technical people.

    • Yeah. Prostitutes don't understand SSL either.

      Slashdot has a weird definition of "pro". I figured it meant cryptography professionals. But if the title came out and said "IT professionals" or "lumber professionals" then it would be obvious that the story has no value.

    • by upuv ( 1201447 )

      ASN.1

      You almost had it :)

    • Re: (Score:3, Insightful)

      by Necroman ( 61604 )

      I'd like to second that motion. The same thing goes for encryption used for wireless routers. When a non-tech friend is setting up a new wireless router and is setting up the encryption part, they just see a list of 3 and 4 letter words they don't understand. And the only reason I know which is the best to pick is reading around the web to know which are easy to crack.

      • Re: (Score:3, Funny)

        by DavidTC ( 10147 )

        No kidding. How hard would it be for the router to actually vaguely explain what OSes can be expected to understand each type of encryption, and which you should use unless you have Specific Older Device or have discovered that some device you have doesn't work. What, do they have 32k of firmware room and no space for explanations?

        Of course, most router control panels appear designed by idiots anyway.

  • as the guy said in the article, it should kick you from a session at expired certs, not allow click through options

    if the cert is expired/ unverifiable, the browser should simply kick the session, end of story

    that should really be the only option available to anyone. its psychological: take this seriously, sorry for the inconvenience. otherwise, lazy admins will let their expired/ malformed certs hang out there for a lot longer (which i've seen even on a credit card site: capital one), because users just easily circumvent the roadblock. they'll definitely notice if no users can get through, and the angry emails pile in their inbox

    i only allow https admin connections to my router, which of course means my browser screams about being unable to verify any certs... since i'm on a subnet. and i bet there are many other valid situations where expired/ unverified certs still represent a valid connection

    however, add up all the valid situations where you want to continue an uncertified https connection, and you are left with nothing but a hill of beans in comparison to the mch more massive problem of psychologically just not taking https seriously enough

    now you just have to convince the 3/4/5 major browser flavors to implement this new status quo

    maybe the certificate authority should simply kick insecure browsers regardless (is that passed to the certificate authority during verification of cert?). that would get browser coders and vendors to notice. of course, what the browser report themselves can be hacked/ finessed, but if that's done maliciously, you're box is already owned, and its already game over regardless through a lot more powerful avenues

    • Because people are going to ask:
      Q: And what about self-signed where you can verify the cert's sig? Some applications only require half-arsed.
      A: There obviously needs to be a workaround; either manual typing or pre-load it or your corporate CA's cert into company intranet browsers. Do something that _forces_ comparison of the sigs, not click click click (click click click click click click for FF3).
    • by tepples ( 727027 )

      it should kick you from a session at expired certs, not allow click through options

      Given the following choices for a site that doesn't take credit cards:

      • A. Use a self-signed certificate for the password form
      • B. Do not use encryption on the password form
      • C. Take the site off the Web entirely

      Which would you choose?

    • by Bigbutt ( 65939 )

      Java 1.6 Upgrade 15 through 18 does this. If you try to access a site with an invalid or expired cert, it just exits. Unfortunately it doesn't say why, it just exits so there are lots of lookups for WTF Java is doing, is my machine broken, or what? And you can't disable 15 and go back to 14 or earlier as it still bails. You have to uninstall 15 to gain access.

      Of course the real problem is that we never updated the certs on our Dell Remote Access Consoles since it worked anyway. Since all the systems are ins

    • I think there are two separate things:
      -having my password be encrypted on the LAN cables
      -having a site being signed by a third party

      For some reason, the first thing can't be done independently from the second. If I understood correctly, at least. Anyway, is there a possibility for websites to give you a secure line to them, without depending on a third party? I don't care about signing, but I care about sniffing on LAN cables.

    • by rgviza ( 1303161 )

      >as the guy said in the article, it should kick you from a session at expired certs, not allow click through options
      >if the cert is expired/ unverifiable, the browser should simply kick the session, end of story

      As long as that's a default setting you can override... Otherwise I have to have a valid paid cert on every one of my dev servers? F*** THAT.

    • Uh, no. Why should small businesses be forced to pay a certificate authority for certificates for appliances (spam filters, etc.), terminal services web pages, external access to webmail and intranet pages over SSL when a self-signed cert (even an expired one) will do? This is a user education issue, not a "let's get rid of it for everyone." It is for corporate use that you can optionally install self-signed certs into any of the mainstream browsers. There is a legitimate need for such things, and forcing e

  • most of them are aware that SSL traffic can be sniffed without their knowledge.

    You're doing it wrong.

    Whoever wrote this article does not know what he's talking about.

    • by jafiwam ( 310805 )
      Well, it IS technically true it can be sniffed. It's just packets after all.

      What the packets contain, on the other hand, won't be available to the person who now has them without a lengthy and large amount of computing power applied to it, plus a great deal of luck.
  • by aembleton ( 324527 ) <aembleton@gmai[ ]om ['l.c' in gap]> on Monday October 12, 2009 @08:07AM (#29717611) Homepage
    With the exception of pre-installed machines, we all have to download our web browsers. What would stop someone carrying out a man in the middle attack on a web browser or distribution download that provided a different Firefox that contains different CA keys. These CA keys could be designed to work the same with https websites, but would allow a man in the middle to also read off the information being transmitted.

    Admittedly this would be very hard to do, but theoretically possible and with the resources of a nation state this may have already been done. As most machines are now built in the far east, what would stop the IE that ships with your computer from also having altered CA keys?

    Would it even be possible to detect this? You could use MD5 checksums on your downloads, but most of the websites that show an MD5 are unsecure, so they could easily be showing a manipulated version of the checksum.

    This strikes me as one of the biggest flaws of our reliance on SSL v2, v3, whatever.

    Please tell me that this isn't possible.
    • by cenc ( 1310167 )

      Yes, and how do know that the browser that you originally installed with your operating system was not forged? How do you know your OS or your bios can be trusted? Hell, for that matter how do you know you can be trusted?

      Ooooooohhh the horror!!!!

      Not to be a troll, but you are really pushing that off in to fantasy land. My point it that security vulnerabilities based on 'just so' hypotheticals, are less likly to be a real world threat. Possible yes. Likely no.

      • If you wanted to watch online banking transactions to a major bank like HSBC would this not be a way to do it?S ure, it would be difficult and would take a while, but you would gather huge amounts of information that is potentially worth millions.

        The only difference between this and a completely unsecure connection is that it would take more effort and organisation and it would be limited to those browsers that you've set up a MITM attack for and have been downloaded. You could set up a MITM attack befor

    • by rgviza ( 1303161 )

      It's definitely possible. You can add CA's willy nilly to any install. This feature is present to allow companies to have self signed certificates used by their employees. You just need to have a server online that it contacts for the CA verification. You can check the list yourself and compare it to what it should be at:

      http://www.microsoft.com/security/ [microsoft.com]

      It will take some digging but it's in there. What's scary is that a hostile pc maker could replace the stock IE with their own that has hardcoded CA's whic

    • What would stop someone carrying out a man in the middle attack on a web browser or distribution download that provided a different Firefox that contains different CA keys.

      You have touched upon what for mean is the biggest argument against disallowing or downgrading self signed certs.

      If someone has the resources to implement a man in the middle attack, what's to stop them doing so with your connection to the certification authority?

      Personally, I believe that man in the middle attacks are little more than th

  • From the article:

    Reguly's survey found that while 83 percent of users check they're using an SSL-secured session before entering their credit card information on a Website, only 41 percent do so when typing in their passwords.

    A lot of non-SSL password forms are on small blogs, forums, or wikis that don't handle financial data. Might the widespread lack of SSL on password pages have something to do with the price of a certificate for each such site?

    • That, and the fact that the free ones you can get (e.g. startssl.com, who I use) aren't automatically accepted. Not a problem for my webmail and admin sections, which are only used by me and my family, but far more annoying if I had a wider range of users hitting "WE CAN'T VERIFY THE CERTIFICATE CHAIN!!!!!" messages when all I want to do is put HTTPS on my site.

  • SSL is all about trust in the end.

    The monster problem is arrogant security people don't trust the other arrogant security people. Trust is implemented via certificates. EG I certify that this thing is what I say it is.

    Problem. Who trusts the guy who gives out the certificate. Well as it turns out. Not many trust the other guys certificate. This leads to a problem. You can't build a pyramid of trust when you can't really trust the other guy.

    So basically it makes it fairly impossible to create something

  • This is not my quote, and I do not remember where I read it.

    "Using SSL to transfer information from server to server is analogous to using armored cars to transfer bags of money from one park bench to another."
  • by Jessta ( 666101 ) on Monday October 12, 2009 @10:38AM (#29719465) Homepage

    "'People still don't understand SSL. This isn't much of a surprise... no one expects that grandma and grandpa know how to what SSL is and what it does"

    Actually, everyone expects that grandpa nad grandma will understand SSL..if they want to do any secure transactions online.
    Not matter how the browsers display certificates, unless people know what they are and why they are there then they won't be secure.
    What percentage of people would call their bank to complain if they internet banking website didn't give an SSL certificate?
    Browsers make a big deal about fake certificates, or self-signed certificates, but don't say anything when you go do an unencrypted site.
    It's a terrible state of affairs, and until either secure transactions get eaiser or certificates are used widely enough that browsers can warn when a site isn't using one transactions of the average joe won't be secure at all.

    - Jesse McNelis

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (10) Sorry, but that's too useful.

Working...