Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-22 Thread Bushmanov Romanov
The way you position yourself in the network infra-structure is of very importance when doing data collection. Users of a given ISP may have rogue certificates while others at the same country but another ISP may not. We as researchers need to position ourselves at different network scopes in orde

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-22 Thread Ralph Holz
Hi, > study this more carefully and sooner as possible. SSL Observatory from > EFF is a step forward but we need more. Their distributed observatory is probably going to help much here, but I can offer the data sets from our paper. I'll put the paper online tomorrow and paste the link here. > 1

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-22 Thread Bushmanov Romanov
Let's be honest, without any methamatical/design/architectural assumptions, about the current PKI practical context. One of the weakest links of PKI is trust delegation to some sort of governement based legislated system. As said, somewhere on this maling list, CA's are companies in those same legi

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-22 Thread Ralph Holz
Hi, Sorry, but this is too good. This is the Bavarian tax office, and ELSTER is the government's tax software: C=DE, ST=Bayern, L=Muenchen, O=Bayerisches Landesamt fuer Steuern - Dienststelle Muenchen, OU=ELSTER, CN=Elster HTTPS-Client, 41 I seem to live in the country of offenders. Ralph -- D

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-22 Thread Ralph Holz
Hi, > Oh, now it makes sense, those are mostly router certs (and various other certs > from vendors who create broken certs like the Plesk ones). You won't just > find them in Korea, they're everywhere, in vast numbers, but (at least for the > router certs) they're usually only visible from the L

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-19 Thread Peter Gutmann
Randall Webmail writes: >Does this warkitting require physical access to the router? No, it's all remotely done. (This is why I have two different routers from different vendors between me and the public internet, and have had this setup for about a decade now). Peter.

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-19 Thread Randall Webmail
From: "Peter Gutmann" To: cryptography@randombit.net Sent: Monday, September 19, 2011 2:32:21 PM Subject: Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea) Ralph Holz writes: >In terms of warkitting routers, they'r

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-19 Thread Peter Gutmann
Ralph Holz writes: >I am wondering if we can't get our hands on such a router and do a proof-of- >concept. Anyone in? In terms of warkitting routers, they're pretty much all vulnerable [0], so all you'd need to do after that is exploit the "CA" certs. OTOH if you can warkit a router you can als

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-19 Thread Ralph Holz
Hi, > Why do we assume that government spies will go to such lengths to get > at an individual's data, when a downloaded root-kit on the target PC > suffices? Because some governments like spying on Gmail accounts. I would agree with you if your goal is to snoop on a dissident, there are easier

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-19 Thread Ralph Holz
Hi, >> http://www.meleeisland.de/issuer_ca_on_eff.csv > > Oh, now it makes sense, those are mostly router certs (and various other certs > from vendors who create broken certs like the Plesk ones). You won't just Hm. I agree that many are router certs, certainly those with brand names of networ

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-18 Thread Peter Gutmann
Ralph Holz writes: >I don't think so. Here is a list of "COUNT(issuers), issuers" from the EFF >dataset. Only those counted that appeared > 200 times. > >http://www.meleeisland.de/issuer_ca_on_eff.csv Oh, now it makes sense, those are mostly router certs (and various other certs from vendors who

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-18 Thread Ralph Holz
Hi, >> In the EFF dataset of the full IPv4 space, I find 773,512 such certificates. > > Could these be from the bizarro Korean DIY PKI (the NPKI) that they've > implemented? Could you post (or email) some of the certs? I don't think so. Here is a list of "COUNT(issuers), issuers" from the EFF d

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-18 Thread Peter Gutmann
Ralph Holz writes: >In the EFF dataset of the full IPv4 space, I find 773,512 such certificates. Could these be from the bizarro Korean DIY PKI (the NPKI) that they've implemented? Could you post (or email) some of the certs? Peter. ___ cryptography

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-18 Thread Ralph Holz
Hi, True, we found about 80 distinct certificates that had subject "Government of Korea" and CA:TRUE [1]. In our full dataset from April 2011, however, we found about 30k certificates with this property. None of them had valid chains to the NSS root store. The numbers do not seem to change over t

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-17 Thread James A. Donald
On 2011-09-18 1:18 PM, Arshad Noor wrote: Why do we assume that government spies will go to such lengths to get at an individual's data, when a downloaded root-kit on the target PC suffices? The government has less ability, but no more ability, to rootkit your computer than do ten thousand Nig

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-17 Thread Arshad Noor
On 09/17/2011 08:01 PM, James A. Donald wrote: On 2011-09-18 12:03 PM, Arshad Noor wrote: Why is it the most plausible assumption? Isn't it far easier to replace the cryptographic libraries on PCs with one that has a "wrapper" that copies all payloads before encryption and after decryption, and

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-17 Thread James A. Donald
On 2011-09-18 12:03 PM, Arshad Noor wrote: Why is it the most plausible assumption? Isn't it far easier to replace the cryptographic libraries on PCs with one that has a "wrapper" that copies all payloads before encryption and after decryption, and transmits the payload to the snooper? That is

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-17 Thread Marsh Ray
On 09/17/2011 09:03 PM, Arshad Noor wrote: On 09/17/2011 06:37 PM, Marsh Ray wrote: It's not entirely clear that a trusted CA cert is being used in this attack, however the article comes to the conclusion that HTTPS application data is being decrypted so it's the most plausible assumption. Wh

Re: [cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-17 Thread Arshad Noor
On 09/17/2011 06:37 PM, Marsh Ray wrote: It's not entirely clear that a trusted CA cert is being used in this attack, however the article comes to the conclusion that HTTPS application data is being decrypted so it's the most plausible assumption. Why is it the most plausible assumption? Isn'

[cryptography] Another data point on SSL "trusted" root CA reliability (S Korea)

2011-09-17 Thread Marsh Ray
Been seeing Twitter from @ralphholz, @KevinSMcArthur, and @eddy_nigg about some goofy certs surfacing in S Korea with CA=true. via Reddit http://www.reddit.com/tb/kj25j http://english.hani.co.kr/arti/english_edition/e_national/496473.html It's not entirely clear that a trusted CA cert is bein