For more than a decade, computer-generated digital certificates have made it possible to authenticate the identity of computer systems, data, and websites by connecting a public key with an identity such as an owner’s name. The process relies on trust. “Secure” websites utilize such a certificate to validate their identity. This digital certificate is usually procured from a company that will verify the identity of the company administrating the site. The digital certificate issued to them will be validated by a trusted root certificate authority or by a server that is trusted by the trusted root. This chain of certificates is called a certificate hierarchy. A small group of trusted certificate authorities is installed on computers within the operating system. These authorities include such names as Equifax, VeriSign, and Thawte. So what happens when the system breaks down?
Last year a series of attacks took place against certificate authorities resulting in the issuance of many rogue certificates. These attacks began with an SQL injection attack against Comodo’s GlobalTrust and InstantSSL databases leading to the issuance of rogue certificates for addons.mozilla.org, login.skype.com, login.live.com, mail.google.com, google.com, and login.yahoo.com. This was followed by an attack on DigiNotar where over 500 rogue certificates were issued including some wildcard certificates such as *.google.com which allowed the certificate to be used for any google.com site. In response, DigiNotar was removed from the trusted list so that all the certificates it had issued were no longer valid.
Legitimizing fake content
Rogue certificates allow attackers to create illegitimate sites that are indistinguishable from real sites like eBay, Google or PNC because their certificate hierarchy can be validated. Users then will be redirected to such sites through phishing or ‘”crucial that man in the middle” attacks where a compromised host in-between the user and a legitimate site sends traffic to an illegitimate site instead.
Some viruses have used rogue certificates to make their content seem legitimate. For example, fake AV, some Zeus variants, Conficker and more recently, Stuxnet and Duqu have used rogue certificates. The threat of rogue certificates that McAfee lists rogue certificates as one of their ten threat predictions for 2012.
Fake certificate authority response
In the wake of attacks on certificate authorities, security professionals are speculating whether there are other certificate authorities that are compromised but do not yet know it. The containment action against DigiNotar was extreme but necessary given the scope of the compromised certificates. A significant disruption of e-commerce could result if other root certificate authorities need to be similarly revoked.
Protection from rogue certificates
There are several ways companies can protect their users from the damage caused by the use of rogue certificates. The most important action that can be taken is to install browser patches as soon as they are released because updates to root certificate authorities will be distributed through these patches. To do this, revisit your patch management policy to determine optimal patch deployment intervals and minimize the number of time that machines are vulnerable to attacks.
Similar to server hardening and other security techniques that limit asset exposure, an examination and subsequent reduction of the number of trusted certificate authorities is important in assuring safe computer usage. Some certificate authorities are region-specific. Thus, they can be removed if sites in those countries are not utilized.
It is important to configure the Internet browser to check for certificate revocations. Certificate revocation lists are maintained by certificate authorities who list the certificates that should not be trusted anymore. Depending on the browser’s settings, it may be accepting revoked certificates. Make sure the browser is set to treat certificates as invalid if the Online Certificate Status Protocol (OCSP) connection fails.
Firefox add-ons such as CertPatrol, Convergence or Perspectives routinely check certificates against a collection of network notaries or against a locally stored database of certificates to further validate certificate credibility. These add-ons warn users when the certificates are different from those recorded elsewhere. A change in a certificate is no guarantee that the certificate is a rogue certificate, but it is a warning sign that the certificate is potentially rogue.
Attacks in recent years have shown that the certificate trust relationship can be exploited to be used to impersonate legitimate sites and services. The best way to assure actual service is to maintain current computer browser and operating system patches. In addition to keeping patches current, reduce your potential exposure to rogue certificates by limiting the number of certificate authorities you trust and enforce certificate revocation checking.