Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Bogus Comodo SSL Certs Targeted Google, Yahoo In Attack Linked To Iran
CRN ^ | Wednesday, March 23, 2011 | Brian Prince

Posted on 03/23/2011 7:21:23 PM PDT by SunkenCiv

Officials at Comodo believe an attack on a registration authority (RA) emanated from Iran and may have been an attempt at monitoring users of popular Web sites.

While details of the actual breach are unclear, what is known is that on March 15, an attack hit a Comodo affiliate RA and swiped the username and password of a Comodo Trusted Partner in Southern Europe. With the stolen credentials in tow, the attacker or attackers used the compromised account to request nine digital certificates across seven domains, including: login.yahoo.com, mail.google.com, login.skype.com and addons.mozilla.org.

(Excerpt) Read more at crn.com ...


TOPICS: Business/Economy; Foreign Affairs; War on Terror
KEYWORDS: google; iran; mozilla; yahoo
Ahmanutjob

1 posted on 03/23/2011 7:21:26 PM PDT by SunkenCiv
[ Post Reply | Private Reply | View Replies]

To: ShadowAce; Swordmaker; Ernest_at_the_Beach; AdmSmith; AnonymousConservative; Berosus; ...
Anti Fascist Encyclopedia

2 posted on 03/23/2011 7:23:35 PM PDT by SunkenCiv (The 2nd Amendment follows right behind the 1st because some people are hard of hearing.)
[ Post Reply | Private Reply | View Replies]

To: SunkenCiv

So what does this mean. Should I change my gmail passwords?


3 posted on 03/23/2011 7:30:44 PM PDT by fso301
[ Post Reply | Private Reply | To 1 | View Replies]

To: fso301
The certificates have all been revoked and no Web browser should now accept the fraudulently issued certificates if revocation checking is enabled.

Enable CRL checking in your browser if it is not already. In IE, go to Tools > Internet Options > Advanced and then scroll down to the "Security" section. Verify that "Check for server certificate revocation" is selected. If it is not, check it and then restart your browser. After that, you will be OK.
4 posted on 03/23/2011 7:44:05 PM PDT by advance_copy (Stand for life or nothing at all)
[ Post Reply | Private Reply | To 3 | View Replies]

To: SunkenCiv

Brian Prince should go back to English 1.


5 posted on 03/23/2011 7:46:07 PM PDT by onedoug (If)
[ Post Reply | Private Reply | To 1 | View Replies]

To: fso301

BTW, you could go ahead and change your gmail passwords. If you happened to end up in a bogus imposter web site and it got your password (you probably did not), you’ll need to change it. And never click through if you get a certificate error message.


6 posted on 03/23/2011 7:46:52 PM PDT by advance_copy (Stand for life or nothing at all)
[ Post Reply | Private Reply | To 3 | View Replies]

To: SunkenCiv

Iran is attacking Obama shills Yahoo and google? Hard to tell who the bad guy is in that one.


7 posted on 03/23/2011 7:47:44 PM PDT by Frantzie (HD TV - Total Brain-washing now in High Def. 3-D Coming soon)
[ Post Reply | Private Reply | To 1 | View Replies]

To: advance_copy

Microsoft also pushes out CRLs (along with updated CA certs) as part of its monthly Windows Update cycle.


8 posted on 03/23/2011 7:53:09 PM PDT by Gideon7
[ Post Reply | Private Reply | To 4 | View Replies]

To: Gideon7

Didn’t know that, thanks. Of course, you still need to have CRL checking enabled in the browser for it to do any good.


9 posted on 03/23/2011 7:56:33 PM PDT by advance_copy (Stand for life or nothing at all)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Gideon7
Out of curiosity, would it be possible to for new certificates to be bundled with signatures (of the new certificate) signed with any previous certificates that might reasonably be in use, and for browsers to warn any time an attempt is made to access a site for which the browser has a certificate, but which advertises a new certificate that isn't signed by the old one?

If on the first time my machine accesses mywonderfulbank.com, the request gets been intercepted by a site which has a bogus certificate, there'd be no way my machine could catch that, but if my machine had previously accessed the real mywonderfulbank.com and received a certificate, there would be no way a phony certificate could pass muster without a warning.

10 posted on 03/23/2011 8:28:21 PM PDT by supercat (Barry Soetoro == Bravo Sierra)
[ Post Reply | Private Reply | To 8 | View Replies]

To: humblegunner

This is probably why Yahoo was having trouble.


11 posted on 03/24/2011 2:34:05 AM PDT by TheOldLady
[ Post Reply | Private Reply | To 1 | View Replies]

To: SunkenCiv

bump


12 posted on 03/24/2011 2:49:39 AM PDT by TheOldLady
[ Post Reply | Private Reply | To 2 | View Replies]

To: advance_copy

The setting in IE is for pull, not push.

Microsoft has already pushed the new CRL to Windows Update (http://www.microsoft.com/technet/security/advisory/2524375.mspx)

Any PC that gets important Windows Updates will get the new CRL immediately regardless of the settings in Internet Explorer.


13 posted on 03/24/2011 7:43:18 AM PDT by Gideon7
[ Post Reply | Private Reply | To 9 | View Replies]

To: supercat
for browsers to warn any time an attempt is made to access a site for which the browser has a certificate, but which advertises a new certificate that isn't signed by the old one?

Nice idea but unfortunately certs don't work that way.

Each cert is independently signed by a higher CA. Many companies can (and do) switch CAs for various business reasons. For example I switched my company's CA from VeriSign to Thawte to save money. Under your system my new certs would not work because the new CA does not match the old one.

In PKI circles various ideas have been kicked around about to increase trustworthyness of a cert, such as co-signing or otherwise having a 3rd party vouch for the CA that signed you. Microsoft already does this to a limited extent with Authenticode-signed device drivers, which requires a Microsoft Cross-Certificate before Windows 7 will load your 64-bit kernel code.

14 posted on 03/24/2011 7:57:57 AM PDT by Gideon7
[ Post Reply | Private Reply | To 10 | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

15 posted on 03/24/2011 3:09:21 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gideon7
Each cert is independently signed by a higher CA.

Is there any ability for a cert to contain multiple signatures? Obviously one needs the CA signature, but does it have to be the only one? My thought would be that security could be greatly improved if as a matter of course certificates were signed by older versions in addition to being signed by CA's. What I'd ideally like to see would be a facility by which a certificate for foo.com could contain a notation which would mean: "Foo.com has no intention of issuing, or requesting the issuance of, any certificates before 3/24/2013 which aren't signed by the public key in this certificate. Be very very very suspicious of any certificates that claim to be from foo.com but do not have such a signature. Also [optionally], if the previous certificate from foo.com had a thumbprint other than xxx, yyy, zzz, or qqq, warn the user that the previous certificate was likely bogus."

Even if someone managed to trick a CA into issuing a bogus cert for foo.com, such a bogus cert would raise red flags if someone who had previously used a valid cert tried to use a bogus one. Also, if someone who used an undetected bogus cert subsequently tried to use a valid cert, they'd get a (somewhat belated) warning of security compromise in that situation as well.

16 posted on 03/24/2011 3:39:18 PM PDT by supercat (Barry Soetoro == Bravo Sierra)
[ Post Reply | Private Reply | To 14 | View Replies]

To: supercat
a certificate for foo.com could contain a notation which would mean: "Foo.com has no intention of issuing, or requesting the issuance of, any certificates before 3/24/2013 which aren't signed by the public key in this certificate.

Again nice idea, but PKI does not work that way. If my business had a scum employee who ran off with a private key for one of my certs signed by my CA (dated before 3/24/2013) who handed it to hackers it before that date, it would still need some mechanism to be invalidated by a CRL to revoke the cert (even if counter-signed) prior to that date in the event of a defection of a trusted officer, with a way to issue a replacement cert.

17 posted on 03/24/2011 7:50:29 PM PDT by Gideon7
[ Post Reply | Private Reply | To 16 | View Replies]

To: Gideon7
If my business had a scum employee who ran off with a private key for one of my certs signed by my CA (dated before 3/24/2013) who handed it to hackers it before that date, it would still need some mechanism to be invalidated by a CRL to revoke the cert (even if counter-signed) prior to that date in the event of a defection of a trusted officer, with a way to issue a replacement cert.

Naturally. I don't see much alternative to that. The purpose of the extensions I want to see is to provide at least some protection against untrustworthy certificate authorities. Right now if a honestbank.com uses certificates from a really good CA, but someone figures out how to get a careless CA (who's on the "trusted" list of many browsers) to issue a certificate for honestbank.com, most browsers would accept a new certificate from the careless CA without batting an eye. I would suggest that there should be a way by which an organization should suggest that any future certs from that organization will be signed using keys whose public half is contained in the old certs.

If a hacker steals a copy of the private keys for honestbank.com, it would be necessary to publish a revocation notice. I don't see any reason the entity requesting the revocation of its key shouldn't, in almost all cases, be able to sign with the old key a notice revoking the old key and assigning a new one. Such a notice should also be signed by a CA, of course. If for some reason an organization can't sign its revocation notices or new certs using its old ones, it should be able to provide public notice of this fact, as well as a means of ensuring that a claimed cert is valid.

18 posted on 03/24/2011 11:34:22 PM PDT by supercat (Barry Soetoro == Bravo Sierra)
[ Post Reply | Private Reply | To 17 | View Replies]

To: fso301
So what does this mean. Should I change my gmail passwords?

Depends. If your DNS thinks gmail is over by the Caspian Sea, I'd be worried.

19 posted on 03/24/2011 11:40:12 PM PDT by cynwoody
[ Post Reply | Private Reply | To 3 | View Replies]

To: AdmSmith; AnonymousConservative; Berosus; bigheadfred; ColdOne; Convert from ECUSA; Delacon; ...
Iran hasn't acted right since it was hit by Stuxnet.

Stuxnet

20 posted on 04/30/2011 8:18:45 PM PDT by SunkenCiv (Thanks Cincinna for this link -- http://www.friendsofitamar.org)
[ Post Reply | Private Reply | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson