On 15/12/17 00:18, Matthew Hardeman via dev-security-policy wrote:
On Thursday, December 14, 2017 at 5:50:40 PM UTC-6, Matthew Hardeman wrote:

Route hijacking your way to what would appear as a proper domain validation is 
practical for even a modestly resourceful adversary.  I suspect that the only 
reason more spectacular demonstration of certs issuing pursuant to such hijacks 
haven't arisen owes to ethical considerations, poor overlap of those with the 
network interconnection experience and the CA DV practices knowledge, and that 
doing it effectively means doing it in a well documented way -- ringing a bell 
you can not unring.

So when I wrote the above, I had not yet seen this (just published):

https://twitter.com/matthew_d_green/status/941460537724080128

FWIW, this is the cert for clientportal.fox-it.com that was used in this attack:
https://crt.sh/?id=278968925

We issued this cert in accordance with the BRs, the Mozilla Root Store Policy, our CPS, etc. Domain control was validated via an email challenge with [email protected]. We revoked this certificate as soon as we were informed that the DNS records had been compromised.

I have lots of ideas on how to help make DV more resilient against this, though 
they have various costs of complexity, infrastructure, and time.

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to