Hi,
I am posting this to a new thread because the other one is too old. I 
thought this would be fixed in ff3 by the new revocation system, but it 
seems some CAs do not use it.

Akamai, a very big content distribution provider used by MANY 
organisations including the german Finanzamt (equivalent to the IRS), 
had a weak key. If I put
127.0.0.1 a248.e.akamai.net
into my hosts file and run an apache with the broken cert (key got 
published in some forums), I can use firefox 3 to connect to 
https://a248.e.akamai.net (which is my local machine) without any 
warnings. I could do a MitM on a network and deliver a trojan to anyone 
who would try to download the official software for tax return reports, 
although the certificate has been already changed. (akamai is used by 
many others too, see https://www.pentagon.mil/ or the ATI driver 
download from 
http://game.amd.com/us-en/drivers_catalyst.aspx?p=xp/mobility-xp and 
probably many many more.)

I do not know why this works, but I know it does and I know it is not 
good that it does. Probably the CA did not revoke the cert correctly. 
It is not enough to blacklist one cert even if you just want to close 
the akamai hole, because they might have had multiple vulnerable certs.

This shows how necessary it is to include a full blacklist of weak 
keys, I don't think anything else will help. If such an important key 
has not yet been revoked in a working way, what about the thousands of 
less visible keys? The RSA blacklists for 1024 and 2048 are 12.8 MB 
total in uncompressed ASCII format, which is not that big if you 
consider the 8 MB urlclassifier2.sqlite. Using a database structure, it 
should be quite fast to look up if a cert is included, and storing the 
data in binary form will cut the size in half.

My suggestion: Issue a FF3 update ASAP that includes (or downloads) the 
blacklists, and shows a warning if a server uses a vulnerable cert. 
Consider that it is possible that stupid admins forgot to change the 
certs (so the warning MAY be shown on legitimate sites), but it is also 
possible that a site already using a new cert gets MitM-ed with an old 
cert.

Regards,
Jan

-- 
Please avoid sending mails, use the group instead.
If you really need to send me an e-mail, mention "FROM NG"
in the subject line, otherwise my spam filter will delete your mail.
Sorry for the inconvenience, thank the spammers... 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to