Susan Baur made the following keystrokes:
 >Am I the only one who finds it ironic that I need to manually 
 >accept an "untrusted" certificate to sign up for the security 
 >discussion mailing list? (The domain is lists.lopsa.org and the 
 >cert is only valid on lopsa.org.)
 
Personal opinion only below.  Sorry for the length of this.

There are 2 camps of thought on this.
1. SSL security is meaningful and the only way it will ever
become useful is to lead by example.  Note I didn't say secure.

2. SSL security has never really be trustworthy and the primary reason
it exists is because there are some big companies making lots and lots
of $$$ on selling it.  Why should I spend the money for "show"?

Why should I spend $$$ on something that doesn't involve $$$ in some
form?   Where is my ROI if I spend the $$ to get one?  What's the
possible harm if I don't?   LOPSA needs to consider this in their
overall setup.  Does #1 above mean enough at this point to justify
the expense (initial and renewal) plus maint of the keys?

What's the motivation for someone to attack it?  The only thing they may
get is someones subscription on a mailing list.  Granted they may be
able to harvest passwords out of the mailman setup, but hopefully nobody
is using the same password on a list server as they do for anything
more significant.  This is a listserv for administrators and hopefully
people know better.  It's not like going after Sony or TJMax with the
hope of getting credit card numbers.

The reality of things is that by default most web servers still
provide access to SSL-v2 and very weak ciphers.  Your browser
should negotiate the most secure of these, but the it's up
to the source to disable the insecure if they care.  In most cases
you, the user will never know which is being used.  Are you
really secure, or is this just another case of the 80year old
bank guard standing in the corner with a gun that has no bullets?

I'll contend that a self signed cert on a site that is configured
to disable older protocols and weak ciphers is more secure than
many sites using various default configs.

Next, there isn't anything from stopping a scammer from 
registering a domain and getting a valid certificate for their
site.  Send you a little phishing mail informing you of a 
problem with your credit card and go to V1SA[.]COM 
where they have mirrored the real site and chances are that
even some of those looking for the locks will fall for it.
The cert on the site is even valid, so that indicator is gone.
Don't forget these crews have lots of stolen credit cards, so
it's not costing them anything to buy a valid cert.

As has been mentioned already, most users have been trained
to just click the proceed anyway box on their browser.  Even
many of the big shopping sites get it wrong, esp when they
redirect their web pages on the back end to go off to the IP
based URL instead of their name based system.  

Try setting up a proxy service sometime that validates certificates
and see how many of your users complain they can't get to 
the business needed to keep your company in operation.

As a final thought on this, even if you have a $$$ cert and
a secure config, can the user really be trusted to have a 
secure connection to your system?  One of the big problems
is that most malware makes use of admin permissions to infect
the desktop.  While most people think of keystroke loggers
and bot infections, we have seen where malware will replace
the DNS config to point to servers that redirect your
requests for the bank to their fake servers.  Note if they
can do that, they can also replace the files on your desktop
that contains the keys to certificate verification.  This is
also true for doing DNSSEC verification of the site you
are talking to.  All bets are off with an infected machines.

Again, speaking for myself, not my job.


/~\ The ASCII         Gene Rackow               email: [email protected]
\ / Ribbon Campaign   Cyber Security Office     voice: 630-252-7126
 X  Against HTML      Argonne National Lab      
/ \ Email!            9700 S. Cass Ave. / Argonne, IL  60439


_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to