Black Hat: Breaking SSL network transactions

Share this article:
By making a simple change, a fake SSL certificate can be created and used to persuade users that it is safe to enter their credit card information on a merchant site.

At a presentation Wednesday at the Black Hat conference in Las Vegas, researcher Dan Kaminsky said that because of a weakness in the SSL signing process, certification is unlikely to work in the near future. In SSL, there is no way to properly attribute responsibility to a security issue, he said.

“Hundreds of people can have the same certificate name with SSL,” he said. “Anyone can register any name; there is little control over names.”

He argued that a better approach to authentication of the web would be to rely on Domain Name Service (DNS), specifically the secure version DNSSEC.

“DNS is 25 years old – it scales, it work,” Kaminsky said. “DNS, for example, could be used to serve encryption keys. Every node on the internet goes through DNS.”

No protocol is perfectly secure, but the main problem relates to MD2, a commonly used cryptographic hash function, Kaminsky said.

“MD2 should not be trusted for validation,” he said. And because of this, “the foundations of chained authentication on the internet are broken. Rather than a focus on the users, an MD2 attack would let you log into servers.”

Browser vendors and certificate authorities have essentially agreed to eliminate MD2, mainly heeding warnings that it will be prone to being broken within 18 months, said Kaminsky.

“The current system backs you into a corner,” he said. “We must fix the problem – we cannot just leave it broken.”

Share this article:

Sign up to our newsletters

More in News

EFF intros wireless router software to boost industry standard

EFF intros wireless router software to boost industry ...

This weekend, the digital rights group released a "hacker alpha" version of its Open Wireless Router software.

Breaches driving organizational security strategy, survey indicates

Breaches driving organizational security strategy, survey indicates

CyberArk interviewed 373 IT security executives and other senior management in North America, Europe and the Asia-Pacific as part of its eighth annual Global Advanced Threat Landscape survey.

Siemens industrial products impacted by four OpenSSL vulnerabilities

The vulnerabilities can be exploited remotely, and fairly easily, by an attacker to hijack sessions and crash the web server of the product.