Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
Trustwave defended itself by saying that the issuing of subordinate roots to private companies, so they can inspect the SSL-encrypted traffic that passes through their networks, is a common practice in the industry."
      Posted Feb 9, 2012 17:27 UTC (Thu)
                               by josh (subscriber, #17465)
                              [Link] (8 responses)
       
Hopefully this leads to an immediate removal of TrustWave from browser trust roots. 
     
    
      Posted Feb 9, 2012 17:37 UTC (Thu)
                               by josh (subscriber, #17465)
                              [Link] (3 responses)
       
At a minimum, after clarifying their CA policy with an appropriate amount of "no really"s, CAs need re-validation against the new policy. 
     
    
      Posted Feb 9, 2012 17:47 UTC (Thu)
                               by josh (subscriber, #17465)
                              [Link] (2 responses)
       
     
    
      Posted Feb 9, 2012 18:30 UTC (Thu)
                               by JoeBuck (subscriber, #2330)
                              [Link] (1 responses)
       
A possible alternative for authorities known to operate in this manner is to have a way of trusting the cert only within a particular domain, say *.mycompany.com.
      
           
     
    
      Posted Feb 9, 2012 18:36 UTC (Thu)
                               by josh (subscriber, #17465)
                              [Link] 
       
     
      Posted Feb 9, 2012 17:40 UTC (Thu)
                               by jimparis (guest, #38647)
                              [Link] (3 responses)
       
It's not clear what that would accomplish.  There are plenty of CAs out there that probably did the same thing, and it seems out of place to punish TrustWave for both proactively revoking these subordinate certificates, and for publicly admitting their existence.  More useful might be to say "Every other CA must similarly revoke such certificates by Feb 15; we'll start looking, and if we find any violations after that point, your CA will be immediately removed from the browser trust root forever".  But as you say, the fundamental model of CAs is flawed. 
     
    
      Posted Feb 10, 2012 2:23 UTC (Fri)
                               by slashdot (guest, #22014)
                              [Link] (2 responses)
       
 
     
    
      Posted Feb 10, 2012 2:25 UTC (Fri)
                               by slashdot (guest, #22014)
                              [Link] (1 responses)
       
 
     
    
      Posted Feb 10, 2012 13:56 UTC (Fri)
                               by Aissen (subscriber, #59976)
                              [Link] 
       
 
     
      Posted Feb 9, 2012 17:40 UTC (Thu)
                               by jd (guest, #26381)
                              [Link] (5 responses)
       
(If the browsers were all flagging these certs and it was as common as is claimed, it would have been widely known before now. So one of those is not the case.) 
 
     
    
      Posted Feb 9, 2012 17:54 UTC (Thu)
                               by josh (subscriber, #17465)
                              [Link] (3 responses)
       
TrustWave issued an intermediate root certificate, which could then sign any arbitrary certificate in a way that browsers would trust, and gave that intermediate root certificate to a company to MITM its employees.  Browsers had no way to notice or warn users about this, unless they used one of the browser extensions that compares SSL certificates with what other people see, or happened to notice that all their SSL certificates came from the same intermediate root of the same obscure CA. 
     
    
      Posted Feb 10, 2012 18:49 UTC (Fri)
                               by jd (guest, #26381)
                              [Link] (2 responses)
       
     
    
      Posted Feb 10, 2012 19:01 UTC (Fri)
                               by raven667 (subscriber, #5198)
                              [Link] 
       
There are proposals for certificate pinning which will store fingerprints much like SSH does, I believe Chrome now does this for *.google.com certs by default, but this is not standard or required or widely deployed behavior. 
     
      Posted Feb 10, 2012 19:02 UTC (Fri)
                               by dlang (guest, #313)
                              [Link] 
       
The same company can sign multiple certs, or you can have different companies sign certs all for the same name. 
This is not just some theoretical use either, this is exactly what's done to replace the certs that expire (typically every year), the vendor signs a new cert for the company, and for some time both the old and new certs are valid. During that time the company replaces the old cert with a new cert on the servers and everyone just accepts the new cert. 
     
      Posted Feb 17, 2012 14:13 UTC (Fri)
                               by robbe (guest, #16131)
                              [Link] 
       
As to common practise, I cannot seem to find anything right now, but a company we dealt with in the past is reselling certificates of various vendors, and the offers on their webpage include "root signing", which I understand to be signing of an intermediate CA. Prices for that begin at 10 k€. These seem to be offered for Comodo, RapidSSL and Thawte. 
Not everyone is that open with their offers, but I'm pretty sure these are available from many CAs for an appropriate price. The legitimate(?) use case is a company that would rather pay a lump sum to have their MITM device work painlessly, than have to install their self-signed MITM-CA certificate as trusted on every end-user device. 
Oh, and Symantec is selling gateways for anti-virus and data leakage prevention. Both purposes would be served well by a SSL-MITM, and probably have one built in (it's state of the art). A CA certificate signed by a generally accepted root CA (like Verisign's) would go fine with that. I am not aware of them doing that. 
     
      Posted Feb 9, 2012 19:18 UTC (Thu)
                               by rriggs (guest, #11598)
                              [Link] (14 responses)
       
All that's required at that point is to proxy all the HTTPS traffic originating from the network and generate SSL certs for the destinations on the fly. (Which is the same thing you do when you have a subordinated root.) 
There certainly are companies snooping SSL traffic originating from their employees' desktops, laptops and smartphones this way.  Some of them are required to by law.  You don't need a subordinated root of a trusted CA to do it. 
What they did is just plain wrong. 
     
    
      Posted Feb 9, 2012 19:39 UTC (Thu)
                               by smoogen (subscriber, #97)
                              [Link] (9 responses)
       
1) Network security. Many malware programs don't check certificate authenticity but will not be using the certs you plugged into a box even if you owned it. The network security boxes then use those * certs to see what is going on anyway. 
2) Personel monitoring. People increasingly bring their own cell phones, laptops and then use the company network. Case law has gone that anything posted there is the responsibility of the company to police. 
Whether or not these make "common sense" or not, too many juries have ruled that companies are responsible for that and there is no safe harbour. So basically it becomes a rule that if you are large enough to sue, you better watch everything you can :/ 
     
    
      Posted Feb 9, 2012 20:16 UTC (Thu)
                               by gmaxwell (guest, #30048)
                              [Link] (8 responses)
       
If you instead argued that the malware would detect the MITM because it would not use the installed roots and then not communicate (victory‽), I would counter that it would equally detect it due to a pinned cert.
 
Certainly every browser user has the expectation that their SSL protected sessions are free of interception from their browser to the far end. As such I would expect and hope that undisclosed secret surveillance would be found to be unlawful, since the expectation of privacy has weighed heavily in every decision related to privacy in the workplace. ... especially because an easy alternative (a private certificate) is readily available and perfectly acceptable when the surveillance is not done in secret.
      
           
     
    
      Posted Feb 9, 2012 20:21 UTC (Thu)
                               by dlang (guest, #313)
                              [Link] 
       
the advantage of having a CA like this over a private one is that for the private one you have to update the valid CA list on every piece of software that is used in the company. Especially if you use mobile devices, this is a lot of work. I can see why this would have been an attractive option, while at the same time I think it's the wrong thing to do. 
     
      Posted Feb 9, 2012 21:21 UTC (Thu)
                               by smoogen (subscriber, #97)
                              [Link] (6 responses)
       
In how it is, that is a completely different thing. With the various laws and requirements from courts, a company that doesn't do this can find themselves in a lot more problems than if they did. That makes it more likely that they will put them in place. Now many of the companies put it in a banner or an HR slip that you sign saying any and all usage of company property can and will be monitored.. but depending on the location in the world they don't have to. 
     
    
      Posted Feb 9, 2012 21:28 UTC (Thu)
                               by gmaxwell (guest, #30048)
                              [Link] (5 responses)
       
I think you're continuing to conflate monitoring (the failure to do so may have unfortunate legal consequences) and secret monitoring (the doing so which may have unfortunate legal consequences).  Or are you actually saying that companies may be legally obligated to secretly monitor users? 
     
    
      Posted Feb 9, 2012 22:00 UTC (Thu)
                               by dlang (guest, #313)
                              [Link] (4 responses)
       
so it's lost in the HR boilerplate but it's not secret. 
     
    
      Posted Feb 9, 2012 22:18 UTC (Thu)
                               by raven667 (subscriber, #5198)
                              [Link] (2 responses)
       
     
    
      Posted Feb 10, 2012 1:33 UTC (Fri)
                               by elanthis (guest, #6227)
                              [Link] (1 responses)
       
     
    
      Posted Feb 10, 2012 9:37 UTC (Fri)
                               by mpr22 (subscriber, #60784)
                              [Link] 
       
     
      Posted Feb 10, 2012 10:37 UTC (Fri)
                               by ekj (guest, #1524)
                              [Link] 
       
But I have no control over what others do. Friends can (and sometimes do) stumble across my company-email somehow, somewhere, then use that for sending me something private. There's no way for me to completely guard against this possibility. You could argue that they "should" know better, but that's not enough to get you out of potential legal problems. 
 
 
     
      Posted Feb 9, 2012 22:09 UTC (Thu)
                               by raven667 (subscriber, #5198)
                              [Link] (1 responses)
       
Its true that the traditional way of setting up a DLP/firewall/SSL proxy is to use an internal CA that is trusted by the clients, I can only imagine that the customer didn't want the administrative overhead of touching every machine to load certs or had some clients they couldn't touch that they still needed policy enforcement on.  Signing a subroot which will be trusted by the majority of clients is a technically easy way around this but clearly even Trustwave agrees that this is a bad idea which is why they have very publicly stopped doing it. 
     
    
      Posted Feb 10, 2012 9:02 UTC (Fri)
                               by farnz (subscriber, #17727)
                              [Link] 
       The thing that makes this obnoxious is that you can get policy enforcement with an internal-only CA - it's just that you have to get clients to accept that the CA chain is broken if you cannot install the internal CA certificate on them.
 Breaking the supposed identity guarantees of SSL for the benefit of one company's monitoring system is a bad move - what would have happened if (for example) that company had turned out to be a hotel chain, using it to snoop on visitors' use of private e-mail and the like?
      
           
     
      Posted Feb 10, 2012 13:43 UTC (Fri)
                               by erwbgy (subscriber, #4104)
                              [Link] (1 responses)
       You just need to issue yourself a CA cert and place that certificate into the list of trusted certs on your computers. That's not hard to do with any OS. All that's required at that point is to proxy all the HTTPS traffic originating from the network and generate SSL certs for the destinations on the fly. Not just speculation as this is exactly what the company I work for does.  They claim it is to enable them to detect malware hidden in SSL connections and that they exclude sensitive sites like banks. 
     
    
      Posted Feb 12, 2012 5:17 UTC (Sun)
                               by acolin (guest, #61859)
                              [Link] 
       
     
      Posted Feb 9, 2012 22:58 UTC (Thu)
                               by signbit (guest, #71372)
                              [Link] (6 responses)
       
I'd like to have a browser that I start with a clean slate in terms of trusted certificate authorities.  I have no idea who "TÜRKTRUSTElektronikSertifikaHizmetSağlayıcısı" is or why should I trust anything they sign. 
You can delete stuff from Firefox, but it gets restored after you restart the browser.  Not good! 
     
    
      Posted Feb 9, 2012 23:22 UTC (Thu)
                               by job (guest, #670)
                              [Link] (1 responses)
       
     
    
      Posted Feb 9, 2012 23:31 UTC (Thu)
                               by signbit (guest, #71372)
                              [Link] 
       
     
      Posted Feb 9, 2012 23:54 UTC (Thu)
                               by ras (subscriber, #33059)
                              [Link] 
       
It does.  At least Firefox 4.0 on Debian does.  Clicking "Edit Trust" allows you to stop trusting the cert for various things, such as "Identifying web Sites". Those settings are remembered across reboots. 
You are correct in saying if you delete a cert it re-appears at the next restart, but it reappears with all trust settings disabled. 
     
      Posted Feb 10, 2012 10:57 UTC (Fri)
                               by njwhite (guest, #51848)
                              [Link] 
       
     
      Posted Feb 12, 2012 6:30 UTC (Sun)
                               by lambda (subscriber, #40735)
                              [Link] (1 responses)
       
The problem is, this breaks the web. Unless everyone does it, thus forcing websites to switch certificate providers, it mainly just frustrates you by making you jump through more hoops any time you go to a site signed with one of those certificates. There is no good way to distinguish between "I'm being MITM'd by a compromised cert" and "this website is still using one of the CAs that I don't trust." And while you can click through the warning if the main page is signed by an untrusted CA, it's really hard to fix the problem when it is using resources (images, JavaScript, and CSS) signed by an untrusted CA while the main content is signed by a trusted one; then you don't get a big scary screen to click through and say "yes, this is OK," you just don't get any of the JavaScript or CSS working and have to dig through the site to try and figure out which resources use what CAs and selectively re-enable those. 
I've had to go back and re-trust most of the certificates that I had un-trusted, because I just couldn't use Firefox that way. 
     
    
      Posted Feb 12, 2012 12:38 UTC (Sun)
                               by dark (guest, #8483)
                              [Link] 
       I recently started using Certificate Patrol (firefox add-on) and it notifies me whenever it accepts a new certificate and gives me a chance to inspect the details. After the first day I had all my usual sites in there so I'm mostly browsing without interruptions again.
 Since I left all the CAs at their default, I can easily tell the difference between a site signed by a possibly-dodgy CA and one that doesn't have a valid signature at all. In the first case I get a notification from Certificate Patrol and I can reject it if it looks too odd for the site. In the second case I get the usual Firefox warning.
 This is in addition to Certificate Patrol's main feature, which is to warn me if a site's certificate changes unexpectedly. The kind of snooping that's described in this article will make it look like many sites' certificates have changed and that will set off all the warning bells.
 Maybe this approach will work for you too?
      
           
     
      Posted Feb 10, 2012 1:49 UTC (Fri)
                               by martin.langhoff (guest, #61417)
                              [Link] (1 responses)
       
Who invited this misfeature to the party?  
     
    
      Posted Feb 12, 2012 14:02 UTC (Sun)
                               by smcv (subscriber, #53363)
                              [Link] 
       
The difference here is that Trustwave gave an intermediate CA key to another company rather than keeping control of it themselves. 
     
      Posted Feb 10, 2012 2:13 UTC (Fri)
                               by slashdot (guest, #22014)
                              [Link] 
       
 
     
    Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
      My company (and no doubt many others) uses a Trustwave certificate for its Exchange server and other internal sites, so not trusting Trustwave isn't really an option.
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      Network security. Many malware programs don't check certificate authenticity but will not be using the certs you plugged into a box even if you owned it.
Er. No.  If they aren't checking they won't care if you're MITMing them.  When an employer would provide a special certificate to be loaded for monitoring purposes it is not to actually permit the MITMing itself: you can be the man in the middle simply by virtue of being in the network path... It's to prevent the detection of/warning about the MITMing.
Personel monitoring. People increasingly bring their own cell phones, laptops and then use the company network.
Like the above, not using a publicly trusted certificate does not inhibit the interception, it inhibits interception in secret (when client software is authenticating the certificate chain).
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
      I guess "a strict subset of your compulsory lunch break, in a separate office with the blinds closed and your monitor facing away from the door" might qualify.
      
          Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Same here. Not sure what's their claim. They setup the MIM recently and without any announcement (afaik). I'm sure there's something in the contract that effectively 'pre-approved' such action, but it's still not nice, because effectively it's secret surveillance until you check (how often does that happen?) or somebody points it out to you. Luckily not everybody was locked into IE and the employees who happened to use browsers without the private cert (yet) kindly exposed the scheme.
Mozilla and Certificate Authorities
      
Mozilla and Certificate Authorities
      
Mozilla and Certificate Authorities
      
Mozilla and Certificate Authorities
      
Mozilla and Certificate Authorities
      
Mozilla and Certificate Authorities
      
Mozilla and Certificate Authorities
      Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
Trustwave admits issuing man-in-the-middle digital certificate (ComputerWorld)
      
           