For more than a decade, computer generated digital certificates have made it possible to authenticate the identity of computer systems, data, and web sites by connecting a public key with an identity such as an owner’s name. The process relies on trust. “Secure” websites utilize such a certificate to validate their identity. This digital certificate is usually procured from a company that will verify the identity of the company administrating the site. The digital certificate issued to them will be validated by a trusted root certificate authority or by a server that is trusted by the trusted root. This chain of certificates is called a certificate hierarchy. A small group of trusted certificate authorities is installed on computers within the operating system. These authorities include such names as Equifax, VeriSign and Thawte. So what happens when the system breaks down?
Last year a series of attacks took place against certificate authorities resulting in the issuance of many rogue certificates. These attacks began with a SQL injection attack against Comodo’s GlobalTrust and InstantSSL databases resulting in the issuance of rogue certificates for addons.mozilla.org, login.skype.com, login.live.com, mail.google.com, google.com, and login.yahoo.com. This was followed by an attack on DigiNotar where over 500 rogue certificates were issued including some wildcard certificates such as *.google.com which allowed the certificate to be used for any google.com site. In response, DigiNotar was removed from the trusted list so that all the certificates it had issued were no longer valid.
Rogue certificates allow attackers to create illegitimate sites that are indistinguishable from real sites like eBay, Google or PNC because their certificate hierarchy can be validated. Users then will be redirected to such sites through phishing or ‘”man in the middle” attacks where a compromised host in-between the user and a legitimate site sends traffic to an illegitimate site instead.
Some viruses have used rogue certificates to make their content seem legitimate. For example, fake AV, some Zeus variants, Conficker and more recently, Stuxnet and Duqu have used rogue certificates. The threat of rogue certificates is so crucial that McAfee lists rogue certificates as one of their 10 threat predictions for 2012.
In the wake of attacks on certificate authorities, security professionals are speculating whether there are other certificate authorities that are compromised but do not yet know it. The containment action against DigiNotar was extreme but necessary given the scope of the compromised certificates. A significant disruption of e-commerce could result if other root certificate authorities need to be similarly revoked.
There are several ways companies can protect their users from the damage caused by the use of rogue certificates. The most important action that can be taken is to install browser patches as soon as they are released because updates to root certificate authorities will be distributed through these patches. In order to do this, revisit your patch management policy to determine optimal patch deployment intervals and minimize the amount of time machines are vulnerable to attacks.
Similar to server hardening and other security techniques that limit asset exposure, an examination and subsequent reduction of the number of trusted certificate authorities is important in assuring safe computer usage. Some certificate authorities are region specific, thus, they can be removed if sites in those countries are not utilized.
It is important to configure the Internet browser to check for certificate revocations. Certificate revocation lists are maintained by certificate authorities who list the certificates that should not be trusted anymore. Depending on the browser’s settings, it may be accepting revoked certificates. Make sure the browser is set to treat certificates as invalid if the Online Certificate Status Protocol (OCSP) connection fails.
Firefox addons such as CertPatrol, Convergence or Perspectives routinely check certificates against a collection of network notaries or against a locally stored database of certificates to further validate certificate credibility. These add-ons warn users when the certificates are different from those recorded elsewhere. A change in a certificate is no guarantee that the certificate is a rogue certificate but it is a warning sign that the certificate is potentially rogue.
Attacks in recent years have shown that the certificate trust relationship can be exploited to be used to impersonate legitimate sites and services. The best way to assure actual service is to maintain current computer browser and operating system patches. In addition to keeping patches current, reduce your potential exposure to rogue certificates by limiting the number of certificate authorities you trust and enforce certificate revocation checking.
For more information:
Why Diginotar may turn out more important than Stuxnet
Certificate authority hack points to bigger problems
Compromised certificate authorities: How to protect yourself