Security Blog

The latest news and insights from Google on security and safety on the Internet

Further improving digital certificate security

7 dicembre 2013
Share on Twitter Share on Facebook
Google

18 commenti :

Unknown ha detto...

I guess that when you say "to inspect encrypted traffic with the knowledge of the users on that network", you meant in fact "to inspect encrypted traffic without the knowledge of the users on that network" ?

7 dicembre 2013 alle ore 17:41
Anonimo ha detto...

Okay well, how and when did it happen? The CA gets a free pass as usual, I presume?

7 dicembre 2013 alle ore 23:05
Unknown ha detto...

That's good news.

8 dicembre 2013 alle ore 09:36
Stephen ha detto...

Seems like if Google really wanted to give this issue the attention it deserves, they would revoke ANSSI entirely.

8 dicembre 2013 alle ore 09:44
Joe Helfrich ha detto...

The Certificate Authority structure is profoundly broken. There are too many points of failure where a valid cert could be issued to untrustworthy people. What's the solution at this point aside from users individually deciding which certs to trust? Can something be set up where once a cert is issued it has to be in some way countersigned by the receiving party, like using your private key to generate a signature for an email message?

8 dicembre 2013 alle ore 13:57
Steve ha detto...

Does Google Chrome feedback when certs don't mach the pin? Also is there a way to look for the sending of these logs so I can load them into a SIEM?

P.S. If so, what certs were MitMed?

8 dicembre 2013 alle ore 15:08
rich ha detto...

Please be aware of the HN discussion on this post and how certificate transparency could be improved further: https://news.ycombinator.com/item?id=6869705

8 dicembre 2013 alle ore 15:09
Unknown ha detto...

Let's translate this into proper English.

The French NSA was spying, doing man-in-the-middle attacks using a certificate authority that it publicly controls. They used it to spy on Google SSL encrypted traffic, and Google found out. If I were to guess, I bet they monitor the fingerprints of all SSL certs in Chrome. Google found out, they revoked the CA and told ANSSI that they were busted.

Then everybody pretended it was some kind of mistake....

8 dicembre 2013 alle ore 15:48
Anonymous ha detto...

Ordinarily, I wouldn't comment.

But this is important.

So I'll do the, rather pointless, Google verification dance.

Basically, I think there are two circumstances here:

1. Where the CA identifies a problem and reports it to browser vendors.

The problem might be the one you describe above, or something else (like a possible intrusion).

In this case, the trust bits for the problem certificate (the intermediary in this case) should be revoked.

2. Where you, or a 3rd party, identifies a problem.

In this case the trust bits for the CA root should be revoked.

The intention here is to provide an incentive for CAs to proactively monitor and report problems themselves.

Lest someone else report the problem and they be entirely disabled.

8 dicembre 2013 alle ore 22:12
Anonimo ha detto...

I have written several times to security team, but they don't take this seriously. So I decided to post my comment here. My issue is how easy it is to recover your password, even though you answer the most of the security questions wrong.

I have received an email from Adam at security team, but he does not seem to understand the core. Basically, what I gather from his email, Google looks at Device ID and IP address, and put so less focus on what users put in as an answer.

Here is one example - I used a shared computer in my company that I used to access Gmail a few years ago for only few times, and I gave wrong answer all to "password you can remember", "recovery address," "time you opened your account," but nonetherless, I was able to "hack" into my account. No questions asked.


That means that, if devide is stolen, or if one use shared computer (even that was years ago), the password is easy to crack even with wrong answers. I think Google should look at what users's answer more closely, and don't put too much reliance on whatever the mechanical algorism you Google using. At the least "last password you can remember" should match - in my case, I gave completely wrong one, "googlemail," which I never used - it went through! I gave completely different opening date, backup email, too, but but I was able to hack into my account using the computer and IP address that I used a few years ago for only few times.


This is very grave problem which needs serious solutions. I think users will prefer much tighter security control, as Google service spans a broad range of things. If Google does not act on this, I have to flag this issue to security journalist, such as Wired ITworld, and many of them out there, because using Google is insecure!. If cracking password is this easy, nobody will use Gmail. I will stop using Gmail and switch to Hotmail.

9 dicembre 2013 alle ore 02:20
Anonimo ha detto...

I am dismayed that the event took place months ago, but only now are we hearing about this. I would think that support for DNSSec across the Google Properties and inclusion of DANE in the Crome browser would provide a realtime and strong level of protection against detect this type of fraud. This would also go a long way to protecting your customers!

9 dicembre 2013 alle ore 08:48
Robert Carnegie ha detto...

You say that the intermediate certificate was used "to inspect encrypted traffic with the knowledge of the users"? You mean that users of the network knew that this would happen?

9 dicembre 2013 alle ore 10:00
James Balcik ha detto...

Why doesn't Chrome check the Certificate Revocation List (CRL)? If in this instance the CA revoked these certificates Chrome wouldn't know any better. Chrome would have to wait for it's certificate revocation metadata to be updated. Chrome doesn't just surf the Internet it's used on the Intranet for accessing applications. Many company internal CA's rely and think that there CRL process is working when it appears Internet Explorer is the only browser that checks CRL's anymore.

9 dicembre 2013 alle ore 14:26
Chema ha detto...


Thanks for your advise.

I don't understand how you detected the unauthorized certificate if it was signed by a valid intermediate CA.

And what does "to inspect encrypted traffic with the knowledge of the users on that network" mean ? Did the users allow to be spied their Google accounts ?

Thanks and regards

17 dicembre 2013 alle ore 06:25
Durai ha detto...

It's a serious problem...Suppose if any rogue employee of CA or Intermediate CA can impersonate any domain and do what he wants.

1 gennaio 2014 alle ore 04:14
R.E. Xavier ha detto...

Ok, this is be off topic, but I just received a notice saying that my inbox has been restored. Even though I was converting it over from a Win 7 to Win 8 machine, I didn't recognize the address or URL. Tell me if I'm being paranoid. Here's the notice:

Gmail Team
5:09 PM (9 minutes ago)

We've finished restoring your inbox To make your transition easier, You are required to upgrade to newly secure server by clicking on follow below:

Follow

Regards,

Administrator

9 gennaio 2014 alle ore 20:22
Unknown ha detto...

This is a great post. It’s Very informative and well writing.

website design baton rouge

18 gennaio 2014 alle ore 00:16
Anonimo ha detto...

this is really a great blog.... thanks for sharing the blog...
ISO Certification Agencies

2 luglio 2014 alle ore 05:56

Posta un commento

  

Etichette


  • #sharethemicincyber
  • #supplychain #security #opensource
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2024
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2023
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2022
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2021
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2020
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2019
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2018
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2017
    • dic
    • nov
    • ott
    • set
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2016
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2015
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2014
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • apr
    • mar
    • feb
    • gen
  •     2013
    • dic
    • nov
    • ott
    • ago
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2012
    • dic
    • set
    • ago
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2011
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
  •     2010
    • nov
    • ott
    • set
    • ago
    • lug
    • mag
    • apr
    • mar
  •     2009
    • nov
    • ott
    • ago
    • lug
    • giu
    • mar
  •     2008
    • dic
    • nov
    • ott
    • ago
    • lug
    • mag
    • feb
  •     2007
    • nov
    • ott
    • set
    • lug
    • giu
    • mag

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms