Tuesday, August 2, 2016

Feedly:SANS Internet Storm Center, InfoCON: green. The Dark Site of Certificate Transparency, (Wed, Aug 3rd)



from SANS Internet Storm Center, InfoCON: green

I am a big fan of the idea behind Certificate Transparency [1]. The real problem with SSL is not the weak ciphers or subtle issues with algorithms (yes, you should still fix it), but the certificate authority trust model. It has been too easy in the past to obtain a fraudulent certificate [2]. There was little accountability when it came to certificate authorities issuing test certificates, or just messing up, and validating the wrong user for a domain based on web application bugs or social engineering [3][4].

With certificate transparency, participating certificate authorities will publish all certificates they issue in a log. The log is public, so you can search if someone received a certificate for a domain name you manage.

You can search certificate transparency logs published by various CAs directly, or you can use one of the search engines that already collect the logs and use them to search [1].

For example, here is an "interesting" certificate for "sans.org", issued by the infamous Symantec test CA [5].

So what is the "dark side" part? 

Many organizations obtain certificates for internal host names that they do not necessarily want to be known. In the past, internet wide scans did catalog SSL certificates, but they only indexed certificates on publicly reachable sites. With certificate transparency, names may leak that are intended for internal use only. Here are a few interesting CNs I found:


vpn.miltonsandfordwines.com
upstest2.managehr.com
mail.backup-technology.co.uk

To find these, I just searched one of the Certificate Transparancy Log search engine, crt.sh , for "internal".

There are currently two options considered to "fix" this problem: 

- Allow customers to opt out of having their certificate logged. This is a bad idea. Malicious customer would certainly opt out.

- Redact sub-domain information from the log. This is currently in the works, but the current standard doesn't support this yet. In the long run, this appears to be a better option.

But you should certainly regularly search certificate transparency logs (or any scans for SSL certificates) for your domain name to detect abuse or leakage of internal information.

 

[1] http://ift.tt/1MtESa8
[2] http://ift.tt/1TXejkE
[3] http://ift.tt/2agJBoZ
[4] http://ift.tt/2aoQ4gM
[5] http://ift.tt/2b1kofh

---
Johannes B. Ullrich, Ph.D.
STI|Twitter|LinkedIn

Web Analytics