22 Million SSL Certificates In Use Are Invalid 269
darthcamaro writes "While SSL certs are widely used on the Internet today, a new study from Qualys, set to be officially released at Black Hat in July, is going to show some shocking statistics. Among the findings in the study is that only 3% of SSL certs in use were actually properly configured. Quoting: '"So we have about 22 million SSL servers with certificates that are completely invalid because they do not match the domain name on which they reside," Ivan Ristic, director of engineering at Qualys, said.'"
Two reasons for SSL (Score:5, Insightful)
Two reasons for SSL: verification and encryption. Sure, if the domains don't match you don't have verification, but the communication is still encrypted, and if you happen to control both ends of the exchange, that's all you need.
Re:Two reasons for SSL (Score:5, Insightful)
Unfortunately, all the browser vendors decided to implement this backwards and instead throw around ridiculously alarming warnings at the user if you dare use SSL for encryption only, and not verification.
You know, instead of the sane thing, just dropping the lock icon or otherwise indicating diminished (but not nonexistent security). Find that a non-expiring cert changes or a page with a verified SSL cert suddenly has a non-verified SSL cert? Then scare the living hell out of the user.
Re:Two reasons for SSL (Score:5, Insightful)
The worst is when they even force users to add exceptions just to watch random websites (Firefox, I'm looking at you). Now not only do I have to deal with the annoying warning blown out of all imaginary proportions, but I'm also adding an exception to a random website just because I want to browse it once in a life time that I may never remember to remove in the future and may cause real security issues later.
I really can't understand what's so wrong with temporary exceptions...
Re:Two reasons for SSL (Score:5, Informative)
Even better when (yes, Firefox again!) the exception you are required to add ALSO changes the security mode used for Javascript! Sites you add exceptions for run as a Trusted Site and have elevated privileges.
Re:Two reasons for SSL (Score:5, Informative)
Firefox allows you to make temporary exceptions; you're just not doing it. When you click on the "Add an exception" button, followed by the "Get Certificate" button, there's a checkbox with the text "Permanently store this exception". Guess what happens if you leave that box unchecked and click the "Confirm Exception" box? A temporary exception is made.
Re:Two reasons for SSL (Score:4, Insightful)
It is technically possible, but when it is hidden behind so much terrible UI, it barely matters that the feature technically exists. Most users would rather have their identity stolen than have to wade through that mess. Frankly, losing all of your money, and spending years sorting out the consequences of identity theft is a lot more convenient than the Firefox cert warning UI.
Re:Two reasons for SSL (Score:5, Insightful)
Certificates don't ensure you're talking to anyone in particular, other than someone who has managed to get their hands on the certificate, which, based on prevalance of rooting and etc., could be quite a range of people.
Certs reliably encrypt traffic between the two endpoints. That's the entire usefulness to the two endusers.
HOWEVER: An entire deceptive financial ecosystem was created when the browser manufacturers put those "scare the heck out of the user" dialogs in there; that meant that ecommerce types *HAD* to get certs that would not raise those warnings -- meaning, buying a bag of bits from someone else, a bag you could have made yourself for free, for all the good it would do you, instead purchased for $50 (or many more) dollars.
It's all based upon one key falsehood: The idea that a cert "assures" you that you're talking to someone in particular. As opposed to the guy who physically walked up to the machine while root was logged in, lifted the cert, and walked away. As opposed to the guy who rooted Apache or Postgres or etc., went in, lifted the cert AND the access to the DNS server, and disconnected. As opposed to the guy who has rooted the DNS elsewhere and has your cert.
It's 100% pure bunk. Certs encrypt. Probably not from the government, but from your average hacker, yeah, they generally succeed in making traffic look like a mess of indecipherable bitrot. That's all the actual service they're good for. That, and keeping browser warnings from ruining your attempt to do e-commerce. Just remember: The latter problem was *caused* by the browser writers in collusion with people like Verisign. The problem didn't exist until they put their heads together.
Reminds me very much of the government's war on drugs. The violence, the killings, the black market... 99.9999% a consequence of stupid, stupid rules, every one of which the government is entirely responsible for. Here, every scared consumer was created by the certificate "authorities" in conjunction with the browser makers. They created a fear of a non-issue so strong that everyone was forced to get in line and pretend (or be bewildered into thinking) that the threat was resolved with the purchased certificate, when that is utter bunkum from start to finish.
Re:Two reasons for SSL (Score:5, Insightful)
Yeah, because talking to somebody whose identity I can't be sure of over an encrypted link is *soooo* much worse than talking to somebody whose identity I can't be sure of over a link that can be trivially sniffed. That's why telnet is better than SSH.
Which would be semi-significant if having a "proper" SSL cert actually gave me an iron-clad guarantee that I was talking to who I thought I was talking to, which it naturally can't.
Re: (Score:3, Informative)
That's why telnet is better than SSH.
On first connection to a given server does provide the server key's fingerprint, which you can (and should) verify against a reference obtained out of band.
And if ever the server's key changes later on, the client will warn you very loudly about it.
So ssh does give you some assurance that you are talking to the server you think you should be talking to.
Of course, somebody could still have rooted the server, or the server admin himself could be shady, but to protect against these is not the purpose of the
Re:Two reasons for SSL (Score:5, Informative)
Actually it's checked by default, when you click 'get certificate'
And many times i've found after unchecking the box and going to hit the 'Confirm' button... it rechecks just after hitting confirm, and closes the window with a permanent exception added, despite my attempt to only add a temporary one.... very annoying Firefox...
Re:Two reasons for SSL (Score:4, Informative)
Re:Two reasons for SSL (Score:5, Interesting)
They seem to be unable to use standard certificates or even attempt to register them with internet registries. The best is working on a classified network. And getting "WARNING!!! This page may be unsafe! WARNING!!!" notices on an entirely closed and encrypted network.
Re: (Score:3, Informative)
The proper way to do this is by IT adding a custom CA root certificate into every deployed computer, and signing all of the individual private site certs with that cert.
Re: (Score:3, Insightful)
'the army' isn't one big magical network, it's actually hundreds of separate AD domains, and there is more than one branch of the military, some fly planes, some sail ships, some get shot at, they all have different ways of finding people to manage those AD domains. Some suck, some don't. I can tell you those that don't suck do indeed install the correct certificate authorities.
Re:Two reasons for SSL (Score:5, Insightful)
It's a money making scheme - if you look at the "fees" one has to shell out for certificates - has absolutely nothing to do with effort necessary to provide a certificate.
Part of the great pyramid where all the money is rising upwards to a small top, partially fueled by the - is it the dripping down - or trickling down - fantasy.
Verisign must have severely lobbied (greased) the browser vendors...
Certs should be issued by the government, like passports - for a reasonable fee. Probably a dud in US where free market rules with great results as one more and more can see.
Re: (Score:3, Interesting)
Yes... it was a total disaster... fortunately, in the future DNSSEC should make SSL certificates obsolete.
If we can publish digitally signed records in the DNS, which are verifiable with the registrar, it's not too farfetched to say define a signed TXT record which will contain public key information for the web server.
Re: (Score:2)
simple SSL/S.MIME certs can had be had here http://www.startssl.com/ [startssl.com]. i'm not affiliated with them, but i have gotten a few certs from them. you can't beat the price, and their support is timely and helpful. you have to pay for more advanced certs like multiple names, wildcard, etc...
Re: (Score:3, Interesting)
It's a money making scheme - if you look at the "fees" one has to shell out for certificates - has absolutely nothing to do with effort necessary to provide a certificate.
I'm guessing you think the "effort necessary to provide a certificate" is not much more than the cost of computing the hashes for the certificates, right? Everybody knows that OpenSSL is free, open-source, and is available on a freely downloaded Linux ISO and burned to a $0.10 blank DVD, right? And a $25 P4 could calculate thousands of the
Re: (Score:3, Informative)
CAcert withdrew their request [mozilla.org] for their root cert to be included in Firefox. Talk to CAcert about it.
StartCom free SSL certificates [startcom.org] now seem to work in Internet Explorer, Firefox, and Outlook out of the box. It looks like they're the best bet for free certs that won't display warnings in popular products.
Re: (Score:3)
Unfortunately, all the browser vendors decided to implement this backwards and instead throw around ridiculously alarming warnings at the user if you dare use SSL for encryption only, and not verification.
There is nothing at all insightful about that post. If I go to connect to www.mybank.com and instead my connection is hijacked to xyz123.fubar.ru then I sure as hell want my web browser to scream and shout that the connection is invalid.
Not having my banking logon details stolen is a metric fsckload more important than people being able to log on to uncertified sites without adding an exception.
Re:Two reasons for SSL (Score:4, Insightful)
If you connect to your bank through HTTP (and aren't redirected), nothing will save you from an attacker stealing your bank details unless you notice the lack of a lock icon indicating an SSL connection. This is exceedingly likely if, say, Joe Average user just types www.bank.com in his address bar and an attacker hijacks his connection and replaces the usual redirect to HTTPS with a man-in-the-middle attack on the bank.
Therefore, it makes zero sense to throw huge warnings for untrusted certs and yet do nothing for plain old unencrypted HTTP.
The only sane way to implement SSL warnings is to use memory. This gives you increased security (why did ChinaSSL suddenly start providing my bank's certificate? Right now, if that happens, you're 100% screwed) and avoids annoyances (no huge four-click warnings if you visit a site for the first time and its certificate is not verified by a CA).
Right now we're in the ridiculous situation where the least secure connection (HTTP) is given preferential treatment over the somewhat secure connection (unverified HTTPS), and yet the most secure connection (verified HTTPS) is both less secure than it could be (no sanity checks, if any CA signed it then it's good) and can be trivially downgraded to insecure HTTP, depending on the user's browsing habits.
This nonsense prevents widespread adoption of HTTPS for personal and noncritical sites. If browsers shipped with something like Certificate Patrol (tweaked for user usability instead of paranoia, avoiding dialogs during "normal" situations) and ditched the stupid warnings for untrusted SSL certificates (if they've never been seen using a trusted cert) it would go a long way towards encouraging the use of HTTPS and the Web would be a much safer place as a result.
Right now, if you go connect to www.mybank.com (which defaults to HTTP) and your connection is hijacked, unless you notice the lack of a lock icon, you're screwed. This is no worse than having an unverified SSL cert served and having the browser not display the lock icon as a result. It's definitely worse than the proper implementation, where the browser would warn you of an unencrypted connection that's usually encrypted, or having an unverified SSL connection that was previously seen as verified.
Re:Two reasons for SSL (Score:4, Informative)
That's why browsers are starting to add things like ForceTLS, which will add an interface so you can tell the browser to only visit a site with SSL
Those users most likely not to notice the lock icon will not know about this, and not know for which site they'd need to set this.
and for the website to the tell the browser (for a fixed time) to visit the site only with SSL.
Many big sites use SSL only on certain pages. So either the protocol's granularity is the domain, and those sites are screwed (either can't use the feature, or incur the SSL overhead even on those pages that don't need it), or the granularity is finer (precise URL within site) and the man-in-the-middle will just set up a fake login on a URL in the domain that is not marked "SSL only".
And many large sites (Facebook, I'm looking at you) don't care about making it obvious to users that they use SSL: the default login form is on a plain HTTP page, and even though the submission URL is actually SSL, there is no easy way (short of view source) for the user to check that this is (still) the case.
Case in point: a while back, a friend of mine asked me to help him find out his estranged wife's Facebook password. He still had control over her Internet router. We set up a man-in-the-middle which just patched the Facebook login form to submit over plain HTTP rather than HTTPS, and she didn't notice anything...
Re: (Score:3, Insightful)
So you want defense against snooping but don't care about defense against MITM attacks. Fair enough, I'm all for raising the bar, but don't be lured into thinking your communication is secure.
Re: (Score:2)
Re:Two reasons for SSL (Score:5, Informative)
Invalid argument: Free SSL certificates: http://cert.startcom.org/ [startcom.org].
Re: (Score:3, Insightful)
Re: (Score:3, Interesting)
They've been supported for a while now, at least in Mac OS X. (I qualify that because I'm not 100% sure they don't pull in the OS's trusted roots.) Point Firefox at https://www.gatwood.net/ [gatwood.net] if you want to confirm it for yourself.
Re:Two reasons for SSL (Score:4, Informative)
Re:Two reasons for SSL (Score:4, Insightful)
> I purchased a five-year certificate from
> rapidssl.com for $60 a few years ago....
> The cost is minimal.
It's not just a cost issue, it's the principle.
You bought a "five-year" certificate. Why does it expire in five years? Does it spoil like milk? Do the bits wear with repeated use? No, it's a scam. RapidSSL don't have do do a single thing after generating the cert other than awaiting your next payment.
According to:
http://www.rapidssl.com/buy-ssl/index.html [rapidssl.com]
they will sell us a "wildcard" cert for the low-low price of $796 for five years. So I correct myself; it's the cost AND the principle.
Re: (Score:3, Insightful)
the reason 5 years is a bad idea is, because the bits can get guessed (brute force). This usually takes a lot of time, but it doesn't have to be and you should use a new one pretty much every year.
That is ridiculous. If you're afraid of brute force, use longer keys.
As it is, people use the same private/public key pair for the next CSR anyway, so expiry doesn't protect you from brute force anyway.
Re: (Score:3, Insightful)
Re: (Score:2)
You may as well just self sign if you are going to use a certificate that isn't in the root keys of any major OS
Re: (Score:2)
the startcom root cert has been distributed by browser vendors for a while now. eg: it was shipped via Windows Update in Sept/2009
Re:Two reasons for SSL (Score:4, Interesting)
It's considerably secure if your browser caches the certificate and puts up a warning if it changes. Then you need to be MITMed on your first visit for it to be effective, and then it has to keep up or you'll notice.
This is how SSH verification works, and I don't see many people getting MITMed, even if you don't usually check the fingerprints.
Re: (Score:2)
Umm.. I'm not aware of any browser that will warn you of a changed certificate if the cert is signed by a valid authority. So if I can convince the drooling morons at the SSL cert authority to give me a cert for your domain, the game is over.
Re:Two reasons for SSL (Score:4, Insightful)
The Certificate Patrol extension for Firefox will. It'll tell you when a certificate changes and whether it should (e.g. whether it was near its expiration, and whether the issuer has changed).
Re: (Score:2)
The morons are the ones making the browsers - since the current browser architecture requires you to trust ALL CAs that are installed in your browser for ALL possible sites. This issue has been known for years but they refuse to fix it.
So if some Randomistan CA signs yourbank.us it's treated as valid even if the old cert was valid for years and was
Re: (Score:2)
Then delete the certs from CAs you don't trust: Preferences -> Advanced -> Encryption -> View Certificates -> Authorities -> Select the one you don't like -> Delete.
There, any cert that's signed by that CA will show an invalid certificate error.
Re: (Score:2)
Fact is I don't trust any of the CAs. So I have long removed all CA certs from one of my browsers (I use more than one browser for security and other reasons, and my browsers don't all run as the same user - so if some exploit gets one browser, it's harder for it to affect the other browser instances).
You seem to think it's so simple, let me ask you this: do you have Entrust's certs in your browser? Do you trust CNNIC? Entrust has signed at least one of CNNIC's _CA_ certs[1].
I may trust the website I'm deal
Re: (Score:2)
You really think websites are going to have the same ssl certs as those fetched from DNS servers? In practice I doubt that's ever going to happen.
And if the browser bunch haven't even fixed the problem I'm talking about after 5 years, I doubt they'll find a way to use DNSSEC to actually make things more secure.
Re: (Score:2)
Can you? Convince them, I mean?
Re: (Score:2)
Yup, there's so many of them that only want your credit card number and will sell you just about any domain except maybe Microsoft.com or Facebook, etc.
Re: (Score:2)
I don't see many people getting MITMed
Bug 460374: A case of MITM in the wild [mozilla.org]
Re:Two reasons for SSL (Score:4, Insightful)
So you want defense against snooping but don't care about defense against MITM attacks.
Yes, that's exactly what I want as the minimum requirement. Snooping on traffic is incredibly simple to do, and can really be done easily by anyone at any point along connection path. You just start up a packet sniffer, grab random packets, and wait until you catch something interesting. You don't even have to catch an entire session. Successfully pulling off a MITM attack is MUCH more complicated...requiring something trickier, such as hijacking DNS. You can't just be at any random point along the chain and perform the attack on any random connection coming through.
It's like a lock on my front door. I don't delude myself into thinking that nobody can get into my house, but the lock is a safeguard against the easiest attack vector.
Re:Two reasons for SSL (Score:4, Informative)
Your view of both sniffing and TCP hijacking seems to come from the mid-90s. I recommend reading up on both the improvements of switched networking and on the active techniques developed to defeat them. But yes, MITM is harder to get right, just as these techniques were harder to develop than just turning the network adapter to promiscuous mode.. but once they're developed, it's just a tool that anyone (or bot) can wield.. and they have been already.
Re: (Score:3, Informative)
Re: (Score:3)
Re: (Score:2)
Sometimes, but other times no. Examples: a connection that never leaves my subnet, if someone can launch a MITM on my network, I'm so much more screwed than I thought I should just give up in the first place. OR, a connection that I first initiate on a shared network, store the exception and THEN make remotely. OR, a connection that I verify the signature for over the phone.
Re: (Score:2)
Umm.. if they can sniff unencrypted traffic on your subnet then you're screwed too right?
Re: (Score:2)
Even against snooping, since that's exactly what an MITM attack is.
Re: (Score:2, Insightful)
Of course, ideally, we'd verify the certificates over physical means. Until there's an easy way to do that you always run the risk of connecting to an impostor. OTOH, people are happy to give money to a random compa
Re: (Score:2)
Two reasons for SSL: verification and encryption. Sure, if the domains don't match you don't have verification, but the communication is still encrypted, and if you happen to control both ends of the exchange, that's all you need.
IMHO, that's a fail. If your users are trained to just click through certificate exception errors then all someone needs to do is intercept your dns or otherwise subvert your dns lookups and when your users go to www.mybank.com but end up at the bad guys site they won't know the difference and you'll be giving the bad guys your credentials (over an encrypted stream - woohoo!)
If you control both ends of the exchange (eg a corporate intranet) then use a self signed cert and give your users the CA public key v
Re: (Score:2)
> and give your users the CA public key via a secure means,
If you're talking about browsers, you have to remove/disable the other CAs from your users browsers/OSes.
Otherwise those CAs can provide valid certs for your sites (or for other CAs!). Whether knowingly/complicitly or unwittingly.
If you are unwilling/unable to remove those CAs you need a browser that can warn or prevent access if server certs are signed by wrong/unexpected CAs.
Otherwise things aren't really that secure.
Do you really trust some CA
Re:Two reasons for SSL (Score:5, Insightful)
If you don't control the whole path between (in which case, you probably don't need encryption), the absence of verification renders encryption pointless.
If you control both ends, there is no reason not use valid certificates (both matching the domain and signed by a CA -- your own, if nothing else).
Invalid certificates of the type at issue (not matching the domain) usually mean you've bought a certificate from a commercial CA, and are using it on a domain other than the one you've bought it for, possibly because you have different domains that resolve to the same address (domains with and without "www." prefix where both use the same certificate that is intended to have the "www." prefix are the most common ones I've personally encountered on the web.)
Mod parent up (Score:3, Informative)
Re: (Score:3, Insightful)
Any party along the way can read your message if there's no identification. If I'm trying to talk to https://example.com/ [example.com] without identification while any node between me and example.com is compromised, that node can establish an encrypted connection with example.com and an encrypted connection with me. I send the attacker encrypted data, the attac
I left this comment there.. (Score:2)
This study is bogus, and I can say why. Let's say you have a web server, and let's say it has a few dozen name-based websites hosted, one of which uses SSL for a shopping cart. If you "scanned" the server by domain name for SSL support, ALL of the name-based virtual hosted domains would "reply" because SSL is IP-specific, not domain specific. Thus, with 25 domains, all would "support" SSL with mis-matched domain names.
This problem is WORSE when you have multiple IPs on a single server (as I've done many tim
I don't need to confirm my own idenity. (Score:2)
I use non-conforming SSL all of the time... to get back to my own servers where I don't need to verify organizational integrity, I just want an encryption layer protecting me from snoopers.
Yeah, I'll honor the stop sign if a site asking me for money or access to another account can't verify itself, but why do I need to check my own ID?
Re: (Score:3, Informative)
but why do I need to check my own ID?
MiTM attack. e.g. using an internet cafe, which installs a transparent SSL proxy and can monitor all your transactions. Its OK if you have your own browser device, and previously installed your SSL certificate over a secure channel. But if you get the 'stop sign' over an insecure channel, take it seriously. They don't need to clone your server to compromise you, just a man-in-the-middle.
Re: (Score:2)
You can prevent that with public key fingerprinting if you control both end points, which you do assuming you are using your own laptop at the internet cafe. If you aren't using your own laptop, then there's a lot more to worry about than the communication channel.
Re: (Score:3, Informative)
Duh (Score:5, Interesting)
Re:Duh (Score:5, Interesting)
Virtual hosts mean if you just do an IP scan you will likely run into an SSL site that doesn't match the first URL associated with an IP.
Wish I had mod points. I was about to post the exact same thing.
Even ignoring servers hosting multiple distinct sites (e.g. at a typical webhosting company) on one IP with some sort of management interface behind SSL on port 443, sites are often configured with their "secure" portion behind a different vhost, but the same IP (e.g. http://example.com/ [example.com] may point to the same IP address as https://secure.example.com/ [example.com], but you're still going to get an SSL-secured response from https://example.com/ [example.com], just not the one you might expect).
One can make reasonable arguments that these might not be ideal configurations, but they don't present the serious practical problems implied by the article.
Re: (Score:2)
Re:Duh (Score:4, Insightful)
Also, every dedicated server has SSL for logging in (Server Beach, etc.), and the certificate never matches the domain, typically localhost.localdomain or similar. If you aren't doing actual ecommerce, then there is no reason to buy a certificate if you can instead just create one or use the self generated one, and either ignore the warning on your client, or install the certificate on the client as trusted (one mouse click). So to this "poll", it would appear to be incorrect, although it is perfectly fine and secure for the purpose it is being used for.
Re:Duh (Score:4, Interesting)
Indeed. I bet there is a very large percentage of these "misconfigured" SSL certs that are in the list for this very reason. Just because you can get to an IP by a given domain name doesn't mean that's the domain it's intended to use SSL with.
Also, think about all the millions of firewalls and routers out there with enabled WAN access and a bogus ssl cert just to make it work. Think of all the development servers, think of all the self-signed certs (which whould show up as invalid to the researchers because they're not configured to accept the self-signed cert).
I would highly doubt any mroe than 20% of those "misconfigured" servers are actually misconfigured ssl certs for real sites.
Almost completely useless as a result. (Score:5, Insightful)
This week I'm helping a customer with some remote testing with a large hosting company who provides remote system console access via a Java/Web thing.
They sent me a PDF with the instructions for logging in that have a couple pages dedicated to telling you how to ignore the fact that all their certificates are expired or simply invalid, and tell you to check the "Always trust content from this publisher" box in order to eliminate the need for one extra click.
How can we ever expect to get any use out of this stuff if we're constantly training the users to ignore everything the security software is trying to tell them?
It seems to be considered completely acceptable behavior by very large well-known companies too.
G.
Re:Almost completely useless as a result. (Score:4, Interesting)
Why pay for a root-issued certificate when a self-signed one will do perfectly well when it's a known-safe server accessed only by a few authorised users? Just click through the "add exception" or "install certificate" dialog and be done with it.
Epistemology, bitches! (Score:3, Insightful)
It's the distribution, stupid.
A self-signed cert that you just click "accept" for is worthless. It could've been useful, if you'd transferred the cert out-of-band and added it directly to the trusted list, but if you're fetching it off the internet, you've no idea whether the cert you're getting is the real one or not.
CA's are a tool for consolidating the certificate transfer process. Instead of having to manually install every certificate, you really only need to manually install through some trusted pro
Re: (Score:2)
You don't have to verify the certificate with the signer, that's why browsers come pre-loaded with CA certificates. The only thing that you would need outside access for is to check it against a CRL, but that's not necessary.
Re:Almost completely useless as a result. (Score:5, Insightful)
How can we ever expect to get any use out of this stuff if we're constantly training the users to ignore everything the security software is trying to tell them?
We can't, and we shouldn't. When users regularly see warning messages that are abacadabra to many of those users, the effect is predictable (and well understood): user won't read warnings anymore, and just do whatever is most likely to make the warning disappear.
At that point, you're just wasting user's time, making sure that genuine serious events dive below the radar, and waste system resources / application code (warning dialog boxes, etc) that doesn't get you any real-world gain. Which means that overall, you're doing worse than if you had just silently ignored those warnings.
If you want secure: make it work, solid, and easy to use. If that's too much to ask, better forget about it - a half-baked feeling of security is worse than being aware of its absence.
So an obvious better solution would be to handle invalid/broken security tokens for what they are (non-secure), and don't bother users with it other than small (visible) clues that could be checked by users who care and/or know what they're doing. Eg. expired SSL cert in a browser session -> no warning dialog, show URL like regular URLs in address bar (vs. special markup used for secure connections), and open/no lock icon in status bar.
Re: (Score:2)
I worked for a company that used SSL for their primary internal web site but it was composed of content from other unsecured servers. As a result, all the users were getting security warnings from their web browsers. They were using IE 6; other browsers gave more descriptive messages like "mixed content".
IT's response was that it was NOT a security problem. During their next security push they updated IE 6 on their user's machines to ignore the problem.
Re: (Score:2)
Haha, sorry, but that's the only "sig" I've ever had in over 30 years on Usenet, and at least I post as myself and take some responsibility for my own words (even though it's rare that everyone agrees with them).
Thanks for playing though, we have some lovely parting gifts...
G.
Methodology? (Score:5, Informative)
That number seems high. I've seen many cases where a server is configured both at the correct address (say, www.foobar.com) and at another address which is not embedded in the cert (foobar.com). Depending on how you access the site you'll either get a perfectly valid cert or an invalid certificate message.
While a setup like this is improperly configured, it may not matter that much. If nearly all visitors access the site via the correct domain name, the SSL cert is probably doing its job.
Re: (Score:2)
I dunno. A lot of sites I visit (like the RTAI real-time Linux site) use mis-configured SSL certs. In the RTAI case, it's bothersome because I don't need encryption but I do like knowing that the file I'm getting is the file I think I'm getting.
Re: (Score:2)
I suppose the correct config in this case would be to issue a lot of certificates for all names that this site can be accessed, do I?
Not high at all. (Score:2)
In the present context, there is no such thing as a valid SSL certificate.
Until the browser can tell the difference between your bank's cert and a driver vendor's cert, you can't meaningfully tell the browser to trust a cert.
But, really, you shouldn't be doing bank business with the same browser that you use for downloading drivers.
My argument is that every cert is invalid.
No Big Deal (Score:5, Interesting)
"Only about 3.17 percent of the domain names matched," Ristic said. "So we have about 22 million SSL servers with certificates that are completely invalid because they do not match the domain name on which they reside."
If you think about it, though, all he really knows is that the certificate does not match the domain name he used to connect to the server, which may not be the domain name which is meant to be used. The obvious next step would be to attempt to connect to the name given by the certificate, which might well point to the same actual site. Of course, it might be a name that is only valid for an internal network, not on the internet as a whole.
There are also lots of contexts in which a web server includes a default (usually self-signed) certificate with a generic name out of the box - typically web servers used for management of a software or hardware device. If the users don't need SSL, there's no reason for a "valid" certificate to be installed.
In short, he's using the phrase "in use" poorly; the fact that a server responds to an SSL request with a particular certificate does not mean that the certificate is "in use" in any meaningful way.
(These figures might be more meaningful if he had excluded self-signed and locally-signed certificates, looking only at those generated by a known certificate provider. Because they cost money, the latter are more likely to have been intended for actual use, although the actual use still might use a different URL than the one you are scanning.)
33.3% failure on my server by this measure (Score:2)
Comment removed (Score:3, Interesting)
i.e. 22 million virtual sites (Score:3, Insightful)
Duh (Score:2, Interesting)
Re: (Score:3, Insightful)
It is not secure if you can't verify the host you are connecting to. Having a valid certificate that matches the host helps ensure that you haven't connected to some rogue site that is masquerading as or acting as a proxy to the site you think you are connecting to. That is not as unlikely to happen as you might think.
But it not only end users who decide not to care about this. As other posters have noted, it costs money to be compliant. It also costs some time and trouble to generate and set up a proper ce
The Truth? You Can't Handle The Truth...... (Score:2)
Furthermore, valid certificates are now suspect.
Ha! Ha! Fool me once! (Score:2)
This doesn't sound very interesting or shocking (Score:2)
It's all too hard (Score:3, Interesting)
When it was my job to install SSL certificates, understanding it, buying the right certificate and installing it was freakishly difficult. Everyone from the certificate issuers to the server software providers needs to get together and simplify the whole process.
Re: (Score:2)
When it was my job to install SSL certificates, understanding it, buying the right certificate and installing it was freakishly difficult.
I've done it on several different servers for many years. "Freakishly difficult" is more than a little bit of an exaggeration. For something I do once a year, it might take me 10-20 minutes to figure out how to do it again, but beyond that it's not THAT difficult. It could be easier, but how easy does something you do once a year per domain really have to be?
Buying the
Park benches... (Score:2)
I remember reading a comment to the effect that:
"Using SSL to secure transactions between desktop browsers and web servers is like using armored cars to transport bags of money from one park bench to another."
Lots a Problems with This (Score:2)
How about companies that use publicly registered SSL certificates for private LAN servers?
Too many wholesale assumptions here.
Bad Design? (Score:2)
While I doubt the 3% for several reasons other people have mentioned, I have noticed just how freakishly evil it is for even otherwise competent admins I've dealt with to get SSL certs working properly. It seems like something that's so important yet so seemingly designed to thwart you at every turn is either a horribly bad and cobbled together design (it's certainly /fragile/) or specifically intended to increase Verisign's consulting and certificate generation revenues.
Qualys = Security for Dummies (Score:2, Insightful)
We had a decent Infosec guy at our shop, then he left the group, and they bought a Qualys scanner. Now I get chimps telling me that I might be affected by an Apache 2.0 bug, and so I'm vulnerable. I ask what the bug does, and nobody can say, other than "The Qualys test failed". Great. If I send in enough box-tops, can I get my CISSP too?
Exactly (Score:2, Informative)
Sounds like flawed assumptions to me (Score:3, Insightful)
Many moons ago, when I worked for a web hosting company, they had Host Header servers for the low-cost customers.
A given server may have hosted up to 1,000 customer sites all on the one IP address by using the Host header introduced in HTTP/1.1 on tcp/80 (http), but they still had a single SSL certificate representing the server itself on tcp/443 (https). A reverse DNS lookup on the hosting IP returned the server's FQDN, which matched what was on the SSL cert's CN. Apparently this was something commonly done in the web hosting industry due to the ever-decreasing pool of IP addresses (this was in the days before TLS/SSL had mechanisms for clients to request a given certificate CN during the negotiation phase).
I wonder... did the discussed tests perform a reverse-DNS lookup on the web site's IP address before trying to connect to the https port? Was the result of that reverse DNS lookup used to compare against the SSL cert's CN, or did the test blindly assume that the CN must match the original site's FQDN?
The thing is ./ (Score:2)
So what I care about is the encryption side of SSL., I perceive that snooping is more likely then stolen card numbers as I am pretty careful about what online shops I use. But its all a crap shoot.
Worthless article written by total idiots... (Score:2, Insightful)
Think about their conclusions for a second. They are saying the SSL certs are worthless because the CN does not match the hostname. Why would millions of sites continue to pay ~$100 each year for a cert that will spout scary warnings in ALL browsers when their customers visit their web site? Surely this number of commercial organizations are not being that retarded so there must be an alternate explanation. Namely the author of the article and or Qualsys are total morons who are wasting our time.
Of thos
self signed, public access (Score:2)
I suspect that most of those are for 'private' use. I personally have a self signed certificate so that I can do secure webmail from anywhere. Webmail is at a public address where anyone can see it, so a check would show an invalid cert. But in reality, it doesn't matter at all.
The number are skewed and probably meaningless because I strongly suspect I am not the only one doing this.
Not certificates, the Browsers are invalid (Score:3, Informative)
Just discussed that here a little while ago. [slashdot.org]
Certificates may actually be perfectly valid without using the same host name as shows on the Internet, many people already gave reasons for that here on /. in this story.
I want to add that it may be that the wrong side here is the browser, not the certificate.
Treating a site that does not do https and sends data in clear text with no contempt, while treating sites that use self signed certificates as if those are broken criminal sites?
It's like treating clear text passwords (and other data) better than passwords sent over https.
Shows a clear agenda on the part of browser producers - create more revenue for the "signing authorities". Well, who are these signing authorities, how do we know they can be trusted, and what kind of a security theater is this - paying someone so that you / others can trust them? Makes no sense, the entire concept is borked.
Sites need to publish their fingerprints clearly and browsers need to behave properly - at maximum give a warning that the cert is not registered with a CA, but do not try to prevent people from using the site!
Re: (Score:2)
You're all wrong, encryption is NOTHING without trust! There is no point in encrypting your communication with [UNKNOWN], because they could be anyone, and even relay your message to [UNKNOWNS].
You're not encrypting your session from A to B in this case, you're encrypting your session from A to (B) CLOUD.
most people don't care about the potential for SSL to establish a higher degree of "trust"
Uh, the more trust the better. It is not black and white. The average consumer is always going to have to trust their PC/OS manufacturer/reseller doesn't dick with the root keys, because they will not ev
Re: (Score:2)
Yes there is, if the chances of a third party sniffing your connection are higher than the chances of a third party breaking into your connection. Your argument only holds if you view the path between you and the server as a homogeneously insecure cloud. This isn't how real world networks work. Encryption alone does provide increased security over most networks, though it may not provide a