Sunday, January 04, 2009

Experts uncover weakness in Internet security



Here is a schematic diagram and a description of how website certificates are meant to operate.
1
A Certification Authority distributes its CA root certificate (the white one in the diagram) via browser vendors to browsers. These root certificates reside in a "trust list" on the user's PC. This means that all certificates issued by this CA will be trusted by default by the users.
2
A company that wants its website to be secured, purchases a website certificate at the CA (the green one in the diagram). This certificate is signed by the CA and guarantees the identity of the website to the users.
3
When a user wants to visit the secure website, the web browser will first ask the web server for the certificate. If its signature can be verified with the certificate of a CA in the trust list, the website certificate will be accepted. Then the website will be loaded into the browser, and all traffic between the browser and the website will be secured by using encryption.
Independent security researchers in California and researchers at the Centrum Wiskunde & Informatica (CWI) in the Netherlands, EPFL in Switzerland, and Eindhoven University of Technology (TU/e) in the Netherlands have found a weakness in the Internet digital certificate infrastructure that allows attackers to forge certificates that are fully trusted by all commonly used web browsers. As a result of this weakness it is possible to impersonate secure websites and email servers and to perform virtually undetectable phishing attacks, implying that visiting secure websites is not as safe as it should be and is believed to be. By presenting their results at the 25C3 security congress in Berlin on the 30th of December, the experts hope to increase the adoption of more secure cryptographic standards on the Internet and therewith increase the safety of the internet.

When you visit a website whose URL starts with "https", a small padlock symbol appears in the browser window. This indicates that the website is secured using a digital certificate issued by one of a few trusted Certification Authorities (CAs). To ensure that the digital certificate is legitimate, the browser verifies its signature using standard cryptographic algorithms. The team of researchers has discovered that one of these algorithms, known as MD5, can be misused.
The first significant weakness in the MD5 algorithm was presented in 2004 at the annual cryptology conference "Crypto" by a team of Chinese researchers. They had managed to pull off a so-called "collision attack" and were able to create two different messages with the same digital signature. While this initial construction was severely limited, a much stronger collision construction was announced by the researchers from CWI, EPFL and TU/e in May 2007. Their method showed that it was possible to have almost complete freedom in the choice of both messages. The team of researchers has now discovered that it is possible to create a rogue certification authority (CA) that is trusted by all major web browsers by using an advanced implementation of the collision construction and a cluster of more than 200 commercially available game consoles.

The team of researchers has thus managed to demonstrate that a critical part of the Internet's infrastructure is not safe. A rogue CA, in combination with known weaknesses in the DNS (Domain Name System) protocol, can open the door for virtually undetectable phishing attacks. For example, without being aware of it, users could be redirected to malicious sites that appear exactly the same as the trusted banking or e-commerce websites they believe to be visiting. The web browser could then receive a forged certificate that will be erroneously trusted, and users' passwords and other private data can fall in the wrong hands. Besides secure websites and email servers, the weakness also affects other commonly used software.

"The major browsers and Internet players – such as Mozilla and Microsoft – have been contacted to inform them of our discovery and some have already taken action to better protect their users," reassures Arjen Lenstra, head of EPFL's Laboratory for Cryptologic Algorithms. "To prevent any damage from occurring, the certificate we created had a validity of only one month – August 2004 – which expired more than four years ago. The only objective of our research was to stimulate better Internet security with adequate protocols that provide the necessary security."

According to the researchers, their discovery shows that MD5 can no longer be considered a secure cryptographic algorithm for use in digital signatures and certificates. Currently MD5 is still used by certain certificate authorities to issue digital certificates for a large number of secure websites. "Theoretically it has been possible to create a rogue CA since the publication of our stronger collision attack in 2007," says cryptanalyst Marc Stevens (CWI). "It's imperative that browsers and CAs stop using MD5, and migrate to more robust alternatives such as SHA-2 and the upcoming SHA-3 standard," insists Lenstra. ###

Additional information: The expert team of researchers consists of: Alexander Sotirov (independent security researcher), Marc Stevens (Cryptology Group, CWI), Jacob Appelbaum (Noisebridge, The Tor Project), Arjen Lenstra (EPFL), David Molnar (UC Berkeley), Dag Arne Osvik (EPFL) and Benne de Weger (TU/e).

More information on the discovery may be found on the websites of the researchers:
Contact: Alexander Sotirov md5-collisions@phreedom.org WEB: Ecole Polytechnique Fédérale de Lausanne

Saturday, January 03, 2009

Freedom Calendar 01/03/09 - 01/10/09

Negro farmer plowing his field of four acresJanuary 3, 1933, Republican Minnie Davenport Craig (R-ND) elected as first woman to be Speaker of the House in a state legislature.

January 4, 1995, Speaker Newt Gingrich appoints Republican Cheryl Lau first Asian-American woman to serve as General Counsel of U.S. House; Republican Robin Carle becomes first woman elected Clerk of U.S. House.
January 5, 1903, President Theodore Roosevelt nominates African-American physician William D. Crum as Collector of Customs, over racist objections from Senate Democrats.

January 6, 1874, African-American U.S. Rep. Robert B. Elliott (R-SC) delivers eloquent hour-long speech supporting Republicans’ civil rights bill.

January 7, 1922, Death of Republican Jonah Kalanianaole, native Hawaiian who served as Delegate in U.S. Congress for 19 years.

January 8, 1867, Republicans override Democrat President Andrew Johnson’s veto of law granting voting rights to African-Americans in D.C.

January 9, 1890, Death of abolitionist and U.S. Rep. William Kelley (R-PA), outspoken advocate of equality for African-Americans.

January 10, 1878, U.S. Senator Aaron Sargent (R-CA) introduces Susan B. Anthony amendment for women’s suffrage; Democrat-controlled Senate defeated it 4 times before election of Republican House and Senate guaranteed its approval in 1919.

I do order and declare that all persons held as slaves within said designated States, and parts of States, are, and henceforward shall be free; and that the Executive government of the United States, including the military and naval authorities thereof, will recognize and maintain the freedom of said persons.”

Abraham Lincoln, 16th President of the United States

Technorati Tags: and or and or and or and or and or or and or