Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
The Internet Communications Encryption Security IT Your Rights Online

EFF Asks Verizon Whether Etisalat Deserves CA Trust 135

Peter Eckersley writes "Today EFF published an open letter to Verizon, calling for investigation of a trusted SSL Certificate Authority. Etisalat is a majority state-owned telecom of the United Arab Emirates with operations throughout the Middle East. You may remember that last year Etisalat installed malware on its subscribers' BlackBerry phones, and was recently pivotal in the UAE's threat to disconnect BlackBerry devices altogether if Research In Motion did not provide a backdoor for BES servers' crypto. This company, which appears to be institutionally hostile to the existence and use of secure cryptosystems, is in possession of a master certificate for HTTPS, encrypted POP and IMAP, and other SSL-based security systems. Etisalat's CA certificate is not trusted directly by Mozilla and Microsoft, but was instead delegated as an Intermediate CA by Verizon. As a result, we are asking Verizon to investigate whether it is appropriate for Etisalat to continue holding this certificate, and to consider revoking it."
This discussion has been archived. No new comments can be posted.

EFF Asks Verizon Whether Etisalat Deserves CA Trust

Comments Filter:
  • Well duh (Score:4, Interesting)

    by Pharmboy ( 216950 ) on Saturday August 14, 2010 @08:21AM (#33250088) Journal

    Again, well duh. Is there really any question that they can't be trusted with granting certs when they are so openly hostile to encryption of any kind?

    • Re:Well duh (Score:2, Insightful)

      by mysidia ( 191772 ) on Saturday August 14, 2010 @11:46AM (#33250934)

      If you think Etisalat is untrustworthy... keep in mind you too can have your very own privately branded CA through GeoTrust [geotrust.com], Global Trust's Root Signing service, or QuoVadis / RSA's Root Signing Service.

      You just have to meet their minimum financial net-worth and insurance requirements, policy requirements, and "compliance" guidelines.

      The limiting factor is the cost of these services. If you are willing to pay enough, you can have your own CA.

      The fact of the matter is, trust is not part of the equation.

      X.509 CA / SSL Certificate cryptography practices are very broken.

  • Revoke time (Score:4, Insightful)

    by ewanm89 ( 1052822 ) on Saturday August 14, 2010 @08:22AM (#33250096) Homepage
    Time to revoke Verizon certificates on my computers.
    • by Xugumad ( 39311 ) on Saturday August 14, 2010 @11:18AM (#33250796)

      I've been trying to find these certificates to remove them. They don't appear to be anywhere on Ubuntu (probably for the best)... is that just me, or are they hiding under a strange name?

      • Re:Revoke time (Score:4, Interesting)

        by TheLink ( 130905 ) on Saturday August 14, 2010 @11:42AM (#33250914) Journal
        Verizon owns Cybertrust whose CA cert is installed in Mozilla Firefox.

        From the article:
        "We are writing to request that Verizon investigate the security and privacy implications of the SSL CA certificate (serial number 0x40003f1) that Cybertrust (now a division of Verizon) issued to Etisalat on the 19th of December, 2005, and evaluate whether this certificate should be revoked."

        FWIW, CNNIC (state network information center of China) has it's cert signed by Entrust. So if you don't trust CNNIC, you shouldn't trust Entrust either :).

        You can use the Certificate Patrol plugin to help keep track of CA/cert changes in sites you visit. After all if your bank website's cert was signed by Comodo today, but CNNIC when you go to China, I'd think you'd want a warning. Current browsers by default would NOT give you a warning in this scenario as long as the website's certificate chain is ultimately signed by one of the CA certs installed in your browser.

        So go figure how much the browser bunch really care about your security.
      • Re:Revoke time (Score:5, Interesting)

        by VortexCortex ( 1117377 ) <VortexCortex@pro ... m minus language> on Saturday August 14, 2010 @11:43AM (#33250916)

        If you use firefox: Edit > Preferences > Advanced > Encryption > View Certificates > Authorities

        Personally, I've deleted all of the authorities and only add certificates as I need them.

        This is because a CA can be compelled by the country they are in to sign a certificate for any domain.
        For example: If your browser trusts the Etisalat CA then Etisalat can can create a SSL certificate for Google.com even though Google.com didn't ask for one.
        If your DNS then points to a Etisalat server it can serve pages as Google.com (pretty green "I'm secure" bar and all).

        You'd have to view the cert info to make sure Google's real CA signed the current cert...
        Thawte, Verisign and Verison can be compelled by the US to create fake certs too, but in this case only the IP address would tip you off.

        If my browser was sent a fake cert and fake DNS results I will be presented with an "Untrusted Certificate" screen.
        Since this normally only happens when Google's cert is about to expire I would be alerted.

        tl;dr: CA system is broke because any CA can make a cert for your domain without your consent.

        • by Arancaytar ( 966377 ) <arancaytar.ilyaran@gmail.com> on Saturday August 14, 2010 @04:17PM (#33252412) Homepage

          In part, this problem might be solved by DNSSEC.

          • Re:Revoke time (Score:5, Insightful)

            by bertok ( 226922 ) on Saturday August 14, 2010 @06:21PM (#33253110)

            In part, this problem might be solved by DNSSEC.

            Unfortunately not, because the decision makers of internet security protocols are all greedy pigs who want to charge you money for a service that you can do yourself for free.

            From day 1, the HTTPS CA and DNS CA systems should have been one and the same.

            That is, not tying the two systems together is a gaping security hole that means that even if you control a domain, someone else can issue certificates for that domain and the users can't tell.

            DNS should have had a CA hierarchy built into it from the beginning, so that if you own 'google.com', you can issue a cert for it for free as easily as creating a record, and if anyone else tries to do the same, they won't get very far because they can't create a cert signed by *your* DNS domain key.

            There's so much more money to be made however by taking the CA control out of the hands of the DNS domain admins and putting it in the hands of some corporation.

            • by jroysdon ( 201893 ) on Sunday August 15, 2010 @01:52AM (#33255254)

              I agree 100% regarding SSL CAs should have been based on a DNS hierarchy.

              But there is nothing to stop that from occurring, now that the root is signed, dot-gov, dot-edu, dot-org, dot-biz, dot-us, and may other ccTLDs are signed and available for the domain owners to add their DS keys into the zone to establish a chain of trust from the root all the way down. Dot-com and dot-net are soon to follow in the next year.

              What is missing right now is extending that trust model all the way down to the stub-resolvers built into the OS and/or browser. While there have been a few add-ons, they're not well maintained, and a bit of a kludge (slow as well).

              SSH already has had the ability to verify host key fingerprint signatures based on DNSSEC (SSHFP records). I believe it won't be long until SSL/web browsers will have a method such as this. I could see Firefox being the first to do so, as they have no money ties, but time will tell.

              Before we didn't have DNSSEC implemented, and there was no incentive to add such a DNSSEC SSL Cert model to browsers. Now we finally do. Self-signed certs or self-issued CAs will be perfectly acceptable once browsers can verify them based on their DNS hierachy, just as you are saying we should be using them. All it will take is having the root "." DNS trust anchor in your browser, and you'll never need another Root CA again, especially not from countries that are hostile and/or not trust worthy.

  • by Threni ( 635302 ) on Saturday August 14, 2010 @08:46AM (#33250184)

    Just state the criteria. (I considered putting funds into ethical stock once, but the restrictions seemed dumb, both in terms of what they considered ethical (not in my opinion) and vice versa. In the end I chose them myself.)

  • Blocked (Score:1, Interesting)

    by Anonymous Coward on Saturday August 14, 2010 @08:58AM (#33250216)

    The NY Times story is being blocked by their proxy servers. Trying to keep costumers in the dark as usual.

  • by simpz ( 978228 ) on Saturday August 14, 2010 @09:00AM (#33250222)
    A dodgy trusted SSL authority could trivialise man in the middle attacks (especially with state backing). Can any SSL client apps (Thunderbird/Evolution/Firefox etc) be told to remember an SSL cert for a site and be told to report if it changes? Like how SSH does with it's keys.

    It obviously will change when it expires but at least you could examine it ( a really smart client could tell you that just the dates have changed).

    Then if a valid new cert was put in place between yourself and the actual site you'd see the change.
      • by simpz ( 978228 ) on Saturday August 14, 2010 @09:48AM (#33250374)
        Looks good. I wonder if it can be hybridized so that I can at least get some reassurance from the CA about any new SSL sites I visit (if they feel they are valid) before I accept them.
      • From "Life without a CA":

        How do you validate the certificate? It depends on the other end. For sites I worry about, like my bank or favorite shopping stores, I call support and ask for the SSL fingerprint and serial number. Sometimes the support person even knows what I'm talking about. I suspect they just open their browser, click on the lock icon and read me the information.

        But if the business isn't yet a household name, how would you even see the telephone support number without accepting the certificate? And what do you do about businesses whose telephone hours "conveniently" coincide with the hours when you're supposed to be at work or, especially in the case of overseas businesses, with your ordinary bedtime?

        • by betterunixthanunix ( 980855 ) on Saturday August 14, 2010 @11:40AM (#33250904)
          Well, perhaps people need to reevaluated the risks involved with giving credit card numbers to small, unknown businesses that they cannot find any information about except online.
          • Without a TLS certificate from a well-known CA, how do you recommend that a new small business take money from customers? My employer used to use PayPal, but PayPal cut him off after some Indonesians started using a bunch of stolen credit cards on the web site. It appears PayPal has cut off a bunch of other companies too [paypalwarning.com].

            And how do you recommend that someone securely authenticate to a non-commercial site, such as a blog, forum, or wiki, without a CA and without sending his account's username and password in cleartext over the Internet?

            • by betterunixthanunix ( 980855 ) on Saturday August 14, 2010 @12:58PM (#33251398)
              For a small business, there is always the option of making sales the old-fashioned way: in person. Perhaps that would be a good place to verify a fingerprint. It would also help people avoid scams, since the scammers would have to meet their victims in person.

              As for blogs, forums, and wikis...well, if MITM attacks are a serious concern, then perhaps people should take the time to find the fingerprints for the keys. Maybe even build a web of trust model.

              Look, I am not a fool, and I don't actually think that the majority of people would be willing to take the time to verify key fingerprints and maintain their key rings. The way things should be done is simply not the way things are actually done.
              • For a small business, there is always the option of making sales the old-fashioned way: in person.

                The business was a click-and-mortar retailer. Click brought in several times more revenue (and earnings) than mortar ever did because our order filling system was so much more efficient than competitors'. If we dealt only with customers living within 30 miles or 50 km of our warehouse and retail store, we likely wouldn't be able to pay rent, utilities, and other overhead. Another comparison: imagine if a publisher of mass-market software decided to sell copies of its software only on disc, and then only to residents of greater Green Bay.

                Maybe even build a web of trust model.

                I've read about OpenPGP's web of trust, but how can this work without frequent air travel to get a key signed by people living in different parts of the world?

                The way things should be done is simply not the way things are actually done.

                Do you mean this in the sense of "practice will never match theory" or in the sense that "practice can and should change soon"?

                • by betterunixthanunix ( 980855 ) on Saturday August 14, 2010 @04:39PM (#33252542)

                  I've read about OpenPGP's web of trust, but how can this work without frequent air travel to get a key signed by people living in different parts of the world?

                  Well part of the idea behind the web of trust is that you can derive trust from others who travel. So, for example, you might obtain my certificate, and it was already signed by 3 people whose fingerprints you verified; then you have some assurance that my key is authentic. Since there is a chance that people are conspiring against you, you might limit this to be 1- or 2-deep, so that you don't wind up with too long of a WoT chain. You can also have different levels of trustworthiness; perhaps you require three signatures from people you are personally familiar with, or 6 from people you are not (or some combination, like 2 familiar and 2 unfamiliar; as far as I know, this is not currently implemented with PGP).

                  Right now, though, it is fairly common for people to wind up on the fringes of the web, and have too few signatures on their key for someone they have not met to be able to derive trust from those signatures. This is especially problematic if you want to communicate with someone who is not part of the same social circles you frequent; even among people who have many signatures on their key, it is not uncommon for there to be little or no overlap in those signatures. Bridging these gaps may be difficult without travel, a situation I have found myself in many times (I have quite a few keys in my keyring of unknown validity, which I have seen used to sign messages in mailing lists). With more participants, this would be less of a problem; it might be interesting to try to calculate what the critical mass would have to be for this situation to become vanishingly rare.

                  The way things should be done is simply not the way things are actually done.

                  Do you mean this in the sense of "practice will never match theory" or in the sense that "practice can and should change soon"?

                  Mostly in the "practice will never match theory" sense. In theory, when someone sees an SSL warning, they should immediately stop and call up whatever business they were trying to connect to. In practice, people click right through these warnings. In theory, people should seek signatures on their PGP keys; in practice, many do not bother, and give no thought to communicating with anyone outside of their immediate circle of friends. Most people don't really care about computer security until it is too late (e.g. their bank account is drained, someone forges an email from them, their patients' records are leaked, etc.), certainly not enough to actually put any effort in (like verifying a fingerprint).

  • by davidwr ( 791652 ) on Saturday August 14, 2010 @09:13AM (#33250256) Homepage Journal

    Browsers need to clearly show WHO is authenticating and some measure of "reputation" of each authenticator in the chain.

    Let's use https://www.google.com/ [google.com] as an example.

    Its certificate is issued by "Thawte SGC CA" which in turn is issued by "Verizon, Inc."

    If the "reputation" of Thawte and Verizon were both high, then the lock-symbol in my browser would be green. If either one were "medium" then it would be "orange." If either one had a bad "reputation" then it would be red. Of course if any link in the chain were revoked then there should be no lock-symbol at all and possibly some big nasty warning messages to boot.

    Browsers also need to allow users to remember signatures alert users if they change, to identify poisoning attacks where FakeBank gets a valid, seemingly-reputable certificate for yourbank.com due to a clerical error or fraud AND uses it along with DNS poisoning or other means to fool your bank into visiting FakeBank.IP.Address and getting a "valid" certificate when it wants to go to yourbank.com.

    Whether it's the browser vendor that determines who the reputation vendor is or whether it's the user will largely be a market decision, at least in most countries. In some countries of course the government will try to control reputation, labeling any certificate authority that doesn't follow its rules as "untrusted."

    In the case of Etisalat, reputation vendors in the West may mark Verizon as "green" and Etisalat as "orange" or even "red." The UAE may try to force people in its country to use a reputation authority that marks Etisalat as "green" and COMODO CA Limited, the authority the EFF uses, as "red" in retaliation for bringing this up in the first place. Memo to the UAE if they try this: "Good luck with that."

    • by leuk_he ( 194174 ) on Saturday August 14, 2010 @09:43AM (#33250360) Homepage Journal

      Maybe that is best word. CA only certify WHO somebody is. They do not certify what they are doing is correct.

      By the way, you can alrady look at the certificate and see the chain of trust.

      Looking for details the first secure link of https://www.e4me.ae/e4me/etisalat/newregistration?SID=1&&language=en [e4me.ae] etisat does not use their own CA. funny?

      Revoke that certificate manully? once a certificate is revoked you no longer can look at it due to the interface works. Not really a bug, untill you encounter it.

      • by davidwr ( 791652 ) on Saturday August 14, 2010 @10:06AM (#33250458) Homepage Journal

        By the way, you can alrady look at the certificate and see the chain of trust.

        Yes, I know. The browser needs to be able to interpret this and display an "layman-use" symbol that indicates trust.

        Most browser's current "layman-use trust symbols" are either "signed," "not signed," "partially signed," "signature revoked," or similar. There is no

        actual

        indication of the trustworthiness of the signature, even though the industry trains people to "look for the lock" and equate that lock with trustworthiness.

        Whether this is a user-education issue, where the industry has been telling people the lock means "trust me, I'm who I say I am" when it only means "a chain of possibly untrustworthy people will attest that this web site is who it says it is," or a technical problem depends on how you look at it. Either solution - re-educating the public or fixing the technology so the public sees what it expects - will work.

        Of course, the first solution will drive the banks and e-commerce web sites nuts and therefore won't happen - if people KNOW can't trust the lock, they'll stop doing commerce online.

      • by Kalriath ( 849904 ) on Sunday August 15, 2010 @08:58PM (#33259840)

        Yes they do. Their CA is entitled "ComTrust".

    • by westlake ( 615356 ) on Saturday August 14, 2010 @05:11PM (#33252732)

      Browsers need to clearly show WHO is authenticating and some measure of "reputation" of each authenticator in the chain.

      Who guards the guards?

      Who gets to say who is reputable - and - just as importantly - why should I believe them?

  • by Bob9113 ( 14996 ) on Saturday August 14, 2010 @09:39AM (#33250344) Homepage

    Looking blearily through pre-coffee eyes at my computer screen, I briefly thought I had awoken ten years in the future.

    "Today EFF published an open letter to Verizon, calling for investigation...

    HOLY CRAP! I must have been asleep for years! The whole Google/Verizon/FCC thing must have tipped us over. We must have slid into open fascism while I was asleep, if even the EFF has stopped suggesting that the government perform investigations and has started bowing and scraping before Verizon.

    You maniacs! You blew it up! Damn you. God damn you all to hell!...

    ...Oh -- it's just about a CA.

  • by TuballoyThunder ( 534063 ) on Saturday August 14, 2010 @09:40AM (#33250346)
    There are so many trusted certificate signing authorities that I believe the trust system is untrustworthy. I counted over 40 certificate authorities in Mozilla and I did not make it past the letter "I' in the list of trusted CA's. Throw in the intermediate CA's and the problem gets worse. Lets assume that all CA's are trustworthy. Furthermore, assume that there is a 1 in a million chance for any individual CA in any given year to make a mistake. A system of 100 CA's would have a 1 in 10,000 chance of making a mistake. Many of the CA are regionally focused and it makes no sense why a user should trust all CA's equally.

    The following changes could be useful:

    • selectively prune the trust hierarchy
    • flag certificates that change (there are addons)
    • specify the maximum path length you are willing to trust
    • Be able to assign a trust weight to a CA
    • by davidwr ( 791652 ) on Saturday August 14, 2010 @09:54AM (#33250416) Homepage Journal

      * selectively prune the trust hierarchy

      - Not practical without creating an artificial scarcity problem. You want enough trusters to meet market demand and prevent artificially high pricing.

      * flag certificates that change (there are addons)

      - Very good idea.

      * specify the maximum path length you are willing to trust

      - I'm not sure this is explicitly needed with trust weight assignments. You can assign a weight of "x-1" for each level you drop, and give 1st- and any-other-level certs whatever weight you want - "2" for signers you trust to delegate but don't trust their assignees to delegate, "infinity" for authorities you trust won't ever make a mistake and whose delegates and sub-delegates etc. you trust never to make a mistake, and in between for most others.

      * Be able to assign a trust weight to a CA

      - This is essential. This should be doable by both individuals, independent "reputation authorities" that individuals tell their browsers to query, and for the 99% of people who will default to doing nothing, a reputation authority picked by the browser vendor.

  • by X.25 ( 255792 ) on Saturday August 14, 2010 @10:09AM (#33250466)

    I have had a hard time explaining to people why self-signed certificates are much more secure than "trusted" certificates issues by likes of Verisign, Thawte, etc.

    They still don't understand it :)

    • by Kupfernigk ( 1190345 ) on Saturday August 14, 2010 @10:28AM (#33250528)
      I have a hard time with this. I am operating a web site which provides information to identified users. I have a self-signed certificate which correctly identifies itself as belonging to my site. What is wrong with this? I want you to identify yourself to me, securely, before I will tell you anything.

      In another scenario, someone is using a shared certificate issued by a "trusted" supplier, but owing to the domain structure it could be cloned and used in a MiM attack. My browser doesn't care.

      My conclusion from all this is that, in fact, even the browser vendors have it backwards. They want us to trust, more or less blindly, anything corporate. They want us to distrust anything that is not corporate. In effect, they want us to buy the message "I'm a banker, trust me", rather than "read this contract carefully before signing". In the scheme of things, being issued by a "trusted" CA should rank _below_ being exactly site-specific, not above. That it does not do so seems more for the convenience of corporates than for Internet security in general.

      Now someone please explain why I'm wrong.

      • by Dr. Evil ( 3501 ) on Saturday August 14, 2010 @11:07AM (#33250734)

        How do you revoke a self-signed cert?

      • by jon3k ( 691256 ) on Saturday August 14, 2010 @12:32PM (#33251220)
        Wow, where to start. The point of a trusted CA is you have a 3rd party who can give you the thumbs up or thumbs down on a resource. You seem to work from the assumption that you intrinsically trust the site you're trying to reach. The point of a CA is to verify that you are indeed talking to who you think you're talking to, and to encrypt that communication. If I'm on the Internet and I click a link to xyz-company-ive-never-visited.com and I get an unsigned SSL certificate warning you're saying I should trust that MORE than if I accessed the same site and got a signed SSL certificate from a trusted root CA?
        • by Dr. Evil ( 3501 ) on Saturday August 14, 2010 @01:42PM (#33251654)

          Aside from the problem of revoking a self-signed cert, I agree with this self-signed philosophy.

          The trick is that you need to find a way to bootstrap the trust. That will probably be an out-of-band communication, e.g., a letter, phonecall, visit to an office or something. But once you've established that trust, then you are not depending on multiple third parties, some politically hostile, to ensure that your communications are secure.

          For out of band communication, putting a fingerprint of a signature on a business card could be one method. If you trust that the branch you visited was real, and the person you met was real, you could trust that signature, which could be used to verify the certificate presented by the website.

        • by Kupfernigk ( 1190345 ) on Saturday August 14, 2010 @01:52PM (#33251738)
          I'm saying that nowadays with hosting services sharing certificates among multiple subdomains, you should not trust a signed SSL certificate that is not for that exact domain any more than you should trust a self-signed certificate. It should be important that the certificate be for the exact domain being accessed, but currently it isn't, for commercial rather than security reasons.

          Incidentally, "Wow, where to start" is not an argument.

      • by Fnord666 ( 889225 ) on Saturday August 14, 2010 @10:50PM (#33254506) Journal

        I have a hard time with this. I am operating a web site which provides information to identified users. I have a self-signed certificate which correctly identifies itself as belonging to my site. What is wrong with this?
        ...snip...
        Now someone please explain why I'm wrong.

        As a user, how do I tell that the self-signed cert that I received for your site came from you and not from a MITM between you and I? It is a trivial task to set up a rogue "free wifi!" AP that proxies all connections.

        • by Burz ( 138833 ) on Sunday August 15, 2010 @05:52AM (#33255968) Homepage Journal

          As a user, how do I tell that the self-signed cert that I received for your site came from you and not from a MITM between you and I? It is a trivial task to set up a rogue "free wifi!" AP that proxies all connections.

          1. Never use "free Wifi" without a VPN connection. This is a good general rule.

          2. Sites using self-signed certs should publish their cert's fingerprint 'out of band'. This means you can view the fingerprint on some (preferably separate) web site, or a telephone conversation, or on some printed correspondence. Then access the https: site and when the cert dialog appears, tell it to view it so you can see the fingerprint and compare it with the out-of-band version.

    • by davidwr ( 791652 ) on Saturday August 14, 2010 @10:48AM (#33250624) Homepage Journal

      A self-signed certificate isn't as trustworthy as you think. In particular, it's vulnerable to a man-in-the-middle attack on any computer for which it has not been previously installed.

      Scenario:
      AcmeHardware.com is getting some local buzz for its new online store. They use self-signed keys but most of their customers don't do any manual checking to authenticate the key.

      I'm a rogue operator for localisp and I know it will be featured in the paper tomorrow along with its web site and I know the newspaper will be kind enough to tell readers not to worry about the self-signed key.

      I hijack the DNS for my clients and set up a man-in-the-middle attack. I present a fake key and sniff out personal information.

      Now substitute "many web sites" for this store and "foreign government" for rogue employee of an ISP and you can see why this is an issue for the EFF. The difference is with self-signed keys there is no central place to solve the problem, as any employer, ISP, DNS provider, etc. can do the sniffing.

      Oh, just for the paranoid - if I as a rogue ISP encouraged my customers to install my own signing-key in their key-list, then I could do this to any business not just those using unsigned keys. However, that is harder to do and harder to get away with over the long haul. It might work for spear-fishing attacks though.

      In the next few years, authenticated DNS should make such attacks against either signed or unsigned certificates technically much harder, they will require either getting around the DNS authentication or faking out IPv4 or IPv6 addresses.

  • by kabloom ( 755503 ) on Saturday August 14, 2010 @11:00PM (#33254580) Homepage

    Is there a way I can get a revocation certificate for Etisalat now, and install it now, and not have to wait for Verizon to do something about it?

Work is the crab grass in the lawn of life. -- Schulz

Working...