Security Blog

The latest news and insights from Google on security and safety on the Internet

Improving SSL certificate security

1 Nisan 2011
Share on Twitter Share on Facebook
Google

23 yorum :

Adsız dedi ki...

Hi Ben,

Thanks for the useful information!

However, how is any of this substantially different than the publication of CRLs, which clearly didn't do anything useful in the Comodo certificate fraud?

PKI specified a distributed way of publishing CRLs but almost no-one bothers to check them. Why would they check any new database either? Will Google and Microsoft decide to agree to check the same database (for example?) or simply rely on their own methods?

1 Nisan 2011 12:22
Unknown dedi ki...

Whether this facility is used remains to be seen, but both mechanisms described differ from CRLs, in that no-one has to notice anything is wrong for a certificate to get blacklisted.

As for who will use our database and whether others prefer to do their own thing: this is not a competition. We will offer this service freely for anyone to use. It is up to them whether to use it or not.

1 Nisan 2011 12:50
Peter dedi ki...

"It must be correctly signed (either by a CA or self-signed)."

Are you publishing the list of CAs you recognize?

1 Nisan 2011 19:25
trialrun dedi ki...

Conversely, though, this doesn't let you revoke a previously-seen and previously-valid cert once it becomes stolen. Google--and the other browser vendors--must also do their part to encourage websites and CAs to properly implement CRL or OCSP by more strictly enforcing failures in the browser.

1 Nisan 2011 20:59
Adsız dedi ki...

This has advantages, as John said. But it's certainly not a _replacement_ for OCSP/CRL. What do you do when a valid certificate that was well-known by Google's crawler is stolen? You still need revocation, and this will only happen if browsers start more strictly enforcing revocation check failures. Until that point, it's a chicken-and-egg problem--website owners and CAs have little incentive to worry about reliably responding to OCSP checks because browsers are tolerant of failure, and browsers won't get strict about failure for fear of troubling users with false positives.

If Google wishes to do the _truly_ right thing here, they must induce a little bit of short-term user pain in exchange for long-term security. This is a very clever complimentary measure, but I don't see how it replaces revocation.

1 Nisan 2011 21:04
_ dedi ki...
Bu yorum yazar tarafından silindi.
1 Nisan 2011 21:04
Knodi dedi ki...

So would DANE DNS record make CA authorities useless, cus I'm all for that. Not having to pay $150 to godaddy would be great.

1 Nisan 2011 23:55
Paul van Brouwershaven dedi ki...

First of all I would like to agree that there is definitely a need for improvements in the PKI system.

The post above is raising some questions in the role of Google:

1.> Does Google forget that if there where proper restrictions in the Comodo CA at the first place this incident never happened? (It was also not the first case with this particular CA)

Everyone could get hacked, if you have many RAs like with Comodo that you give full control the change is only much bigger! We have seen this in the past with RA that have issued false certificates without Comodo even noticed it.

It's not fare the blame everything on the hack or the failing PKI system.

2.> If Google is collecting SSL certificate information can you also do some general research as like what is done with the EFF SSL Observatory project?

3.> The wide implementation of DNSSEC would have a positive impact on security and brings a lot of opportunities for PKI. Google is one of the companies that could help to speed-up the implementation of DNSSEC by for example:

a. Creating a symbol in the Chrome browser (like the padlock) if there was a positive verified DNSSEC lookup and vice versa.

b. Something similar could be done near the results in the search engine.

Making DNSSEC visual to the end-user and website owners would definitely help to get a broader implementation.

2 Nisan 2011 05:07
Unknown dedi ki...

Interesting approach. Is Google going to sign the TXT records with RRSIG once google.com gets the DNSSEC signature? (.com is signed, google.com is not yet signed)

If an attacker is MitM-ing your connection to a site, he can be either "eclipsing" you or eclipsing the site. I'd say the "eclipsing you" (e.g. law enforcement) is more likely and then the attacker can just forge the TXT responses. Perspectives' answer is signed (i.e. attacker can only block them; though the distribution of Perspectives' public keys is "SSH known_hosts-like", no revocation either).

With "classic PKI" + TXT&RRSIG it amounts to getting closer to web-of-trust (now we have two hierarchies).

2 Nisan 2011 18:44
Adsız dedi ki...

The DNSSEV Validator (www.dnssec-validator.cz) will get a support for Google Chrome soon as we have migrated from XPCOM to NPAPI, which allows us to support more browsers. Right now we are working on IE.

Anyway Ben, since you are co-author of CAA, do you really feel that the CAA would help in this particular case? Correct me if I am wrong, but the CAA proposal is a way of saying: "If you are nice, don't issue a cert" and if you don't get all CAs in the TA store, you gain no protection against rogue, malicious or hacked CA issuing a certificate for domain "protected" by CAA.

3 Nisan 2011 05:59
Paul van Brouwershaven dedi ki...

@Ondřej Having a DNSSEC Validator add-on for Chrome is nice, but this will not really help for a wide spread use of DNSSEC I think.

It would be a huge step forward if Google would decide integrate a plugin like dnssec-validator.cz by default.

3 Nisan 2011 14:18
Adsız dedi ki...

This doesn't seem useful for certificates with several SubjAltNames. An attacker could create a certificate for www.evil.com and www.ebay.com, use it on www.evil.com until it shows up in the TXT record with high numbers, and then use it to MITM connections to www.ebay.com.

The TXT record should include the domain name for which the certificate has been seen (or at least a hash of the domain name).

4 Nisan 2011 04:41
Von Welch dedi ki...

One question about the Catalog's semantics - if a certificate is revoked, is it removed from the catalog?

4 Nisan 2011 09:11
Unknown dedi ki...

There are 2 easy solutions to make sure this Comodo scenario doesn't repeat itself...
1. Use Extended Validation (EV) SSL, that shows the green bar and the actual organization's name that owns the domain the SSL is issued to. The process for verifying info in an EV SSL is manual and audited annually for each CA.
2. Browsers should NEVER trust any CA root that allows its resellers to do their own ownership validation for their SSL customers. This is gross irresponsibility and sheer laziness on Comodo's part to allow it in the first place.

Our site www.secure128.com processes thousands of SSL orders from various CA's annually and would never take on the legal responsibility of verifying domain ownership... isn't that what you pay the Certificate Authority to do in the first place??

4 Nisan 2011 18:27
Unknown dedi ki...

Hi Ben,
Good idea! If you want this to be successful, please add a Chrome extension that automatically shows this data when you go to a site via SSL.

6 Nisan 2011 14:57
Ramblings of a Nutty Swiss dedi ki...

I've always wondered why browsers don't give you the option to warn you when a certificate for a site changes. Keep a cache, and if it's different, give the user options to react.

Any number of things can be done to help and/or give a gradation of how "bad" things are.

Cache-hit+Verified+Valid+No-CRL+etc == great
Cache-miss+Verified+Valid+No-CRL+etc == good
etc, etc

8 Nisan 2011 15:01
iMickey503 dedi ki...

It Bothers me that the Military's SSL certificates have been out of date since 2001! Of course it might just be more secure to just keep your network locked down and secure in teh first place but What do I know. I want to be a SAN Storage mojo

11 Nisan 2011 18:05
Adsız dedi ki...

@Ramblings of a Nutty Swiss: the Certificate Patrol extension (http://patrol.psyced.org/) for Firefox does this, with some attempt to judge changes as "maybe ok". I have not seen what it looks like for detecting a "bad" cert change.

20 Nisan 2011 16:50
arkanoid dedi ki...

If it is not DNSSEC signed, how do I know the response is not forged?

4 Mayıs 2011 17:50
Adsız dedi ki...

@arkanoid The parent zone (.com) says if the child zone (google.com) is supposed to be signed.

8 Eylül 2011 09:14
Adsız dedi ki...

DNSSEC does not have to be universally deployed to be useful now. The .com TLD and several other TLDs now support DNSSEC. So, some domain owners can enable it today. ietf.org, for example, is using DNSSEC. If the web browser would honor either the existing trust chain used by TLS today *or* the DANE records discussed in the article, then we could move forward. Why wait for the whole world to use DNSSEC before moving forward?

10 Ağustos 2012 03:13
Adsız dedi ki...

Hi Ben, I just recently learned about the Google Cert catalog. When I tried it from shell I did not get the result (3 numbers) as you illustrated. Is the service still running? Can you point me to any updated info? Regards.

18 Eylül 2013 19:41
global protect dedi ki...

For buying a certificate that suits your requirements, go through the features of each SSL certificate, assess your own needs and thereafter, decide.

3 Ocak 2014 16:22

Yorum Gönder

  

Etiketler


  • #sharethemicincyber
  • #supplychain #security #opensource
  • AI Security
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2024
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2023
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2022
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2021
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2020
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2019
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2018
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2017
    • Ara
    • Kas
    • Eki
    • Eyl
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2016
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2015
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2014
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • Nis
    • Mar
    • Şub
    • Oca
  •     2013
    • Ara
    • Kas
    • Eki
    • Ağu
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2012
    • Ara
    • Eyl
    • Ağu
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2011
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
  •     2010
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • May
    • Nis
    • Mar
  •     2009
    • Kas
    • Eki
    • Ağu
    • Tem
    • Haz
    • Mar
  •     2008
    • Ara
    • Kas
    • Eki
    • Ağu
    • Tem
    • May
    • Şub
  •     2007
    • Kas
    • Eki
    • Eyl
    • Tem
    • Haz
    • May

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms