Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Mozilla Firefox Security

Mozilla Checks If Firefox Is Affected By Same Malware Vulnerability As Tor (arstechnica.com) 45

Mozilla is investigating whether the fully patched version of Firefox is affected by the same cross-platform, malicious code-execution vulnerability patched on Friday in the Tor browser. Dan Goodin, reporting for ArsTechnica: The vulnerability allows an attacker who has a man-in-the-middle position and is able to obtain a forged certificate to impersonate Mozilla servers, Tor officials warned in an advisory. From there, the attacker could deliver a malicious update for NoScript or any other Firefox extension installed on a targeted computer. The fraudulent certificate would have to be issued by any one of several hundred Firefox-trusted certificate authorities (CA). While it probably would be challenging to hack a CA or trick one into issuing the necessary certificate for addons.mozilla.org, such a capability is well within reach of nation-sponsored attackers, who are precisely the sort of adversaries included in the Tor threat model. In 2011, for instance, hackers tied to Iran compromised Dutch CA DigiNotar and minted counterfeit certificates for more than 200 addresses, including Gmail and the Mozilla addons subdomain.
This discussion has been archived. No new comments can be posted.

Mozilla Checks If Firefox Is Affected By Same Malware Vulnerability As Tor

Comments Filter:
  • While it probably would be challenging to hack a CA or trick one into issuing the necessary certificate for addons.mozilla.org

    That depends [google.com] on the CA [mozilla.org], some are more easy to trick than others...

  • End of story.

  • Let us know when you find something out...

  • by alexandre ( 53 ) * on Friday September 16, 2016 @05:28PM (#52903993) Homepage Journal

    The whole F-ing CA model is broken beyond repair...

    Can we get rid of this joke of a model that we're all relying upon for the rest?

    • And replace it with....what?

      • by jonwil ( 467024 )

        The EFF Sovereign Keys proposal. (although it was developed in the days before block-chain technology became widely known so replacing the centralized servers with a block-chain style system may make the proposal better)
        DNSSEC and DANE (it would be harder to compromise the DNS system and get a fake DANE blob that matches the bogus info for the hackers servers but also passes full DNSSEC validation)
        PGP style web-of-trust where certificates get signed by multiple different entities and you choose whether to t

        • by Hizonner ( 38491 )

          I honestly think that people are actively sabotaging all of the above approaches.

          It's to the advantage of the existing CAs to go make trouble every time something like that comes up at the IETF or wherever. And it's to the advantage of the world's spooks to slow down any standardization that improves security, preferentially slow down the standardization of the most effective alternatives, and make sure that everything is so complicated and option-laden that you can always find a mode you can break.

          I don't

      • by gweihir ( 88907 )

        No security is better than no security combined with a false sense of security. I say we throw it away completely as a historical aberration. A PGP-like web-of-trust (often ridiculed) does a far, far better job in actual reality.

        • A web of trust can be compromised, too.

          Webs of trust rely on humans to make them work. Humans are fallible, evil, can be bribed to change sides, etc.

          Look at Tor. Tor works when there's not many evil nodes but the evidence is that the NSA is setting up tens of thousands of their own nodes all over the place. The chances of not going through several NSA-owned nodes is very slim.

          • by gweihir ( 88907 )

            If you want a solution that cannot be compromised, then you are a) clueless and b) need to disconnect from the Internet. The question is not at all whether something "can" be compromised, it is how difficult it is in relation to how easy it is to notice. And there a web-of-trust shines.

    • by gweihir ( 88907 )

      It is. And it is no surprise that it is. No security-model that requires trust in a lot of different instances that are subject to a lot of different attacks and pressure has ever worked well.

      Incidentally, when the Internet was still young and the CA system as new, smart people already anticipated this. The bureaucrats wanted it anyways, and post-Snowden, I am very much inclined to believe they wanted a broken system. I trust an official certificate about as far as I can throw it when chiseled into a large

  • by manu0601 ( 2221348 ) on Friday September 16, 2016 @08:46PM (#52905043)

    Someone with a forged certificate can impersonate a web site. This is not a vulnerability, this is a feature of the threat model: we blindly trust CA for issuing only legitimate certificates.

    This weakness in the security model can still be addressed, because fortunately we already have a workaround for it: HTTP Public Key Pinning (HPKP) [wikipedia.org].

  • Surely signing extensions and signing software updates use two different certs and either cert is uses the existing HTTPS SSL/TLS CA system for that ?

    Mozilla are a company that clearly deals with and understand X.509 certificates, so surely anything they do themselves where they control both the distribution and verification they use their own CA.

    The only purpose of the "trusted CA" system is to issue certificates where there are three parties involved, a mutually trusted CA, a server (that needs to verify

One man's constant is another man's variable. -- A.J. Perlis

Working...