Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Posted Mar 24, 2015 13:31 UTC (Tue) by ledow (guest, #11753)In reply to: Google: Maintaining digital certificate security by gerv
Parent article: Google: Maintaining digital certificate security
If something is signed by a valid CA that users worldwide may end up accepting without question, that's a different story entirely.
If you want to MITM, nobody is stopping you. Sometimes it's necessary. And that's why you use your own certificate chain and add it to the machines somehow (even on BYOD setups).
Generating a certificate for a MITM that is signed by a CA that browsers trust by default, that's just stupid. Sure, it lets you sniff "unknown", and that's exactly the problem. You just broke the chain of trust, deliberately and knowingly. Thus, you have no right to be a CA.
And THIS is why places like Google publish their certificate hashes and have their browsers check for the correct hash so they aren't MITM'd unknowingly.
Posted Mar 24, 2015 13:38 UTC (Tue)
by gerv (guest, #3376)
[Link]
Gerv
Posted Mar 24, 2015 21:17 UTC (Tue)
by robbe (guest, #16131)
[Link] (7 responses)
But it's not easy nor convenient to do at scale, especially not for for Firefox¹ or mobile devices. For BYOD it may actually incur legal risk².
We sell these MITM proxies at work, and about once a month I have to explain to a customer:
Customer: I want to <X>
¹ Gerv, you still listening? That's my number one pain point for FF on enterprise desktops.
Posted Mar 24, 2015 23:00 UTC (Tue)
by josh (subscriber, #17465)
[Link] (4 responses)
Good. It should be absurdly hard. If it were easier, more people would do it.
Posted Mar 24, 2015 23:18 UTC (Tue)
by pboddie (guest, #50784)
[Link]
Posted Mar 25, 2015 6:44 UTC (Wed)
by epa (subscriber, #39769)
[Link]
Posted Mar 26, 2015 21:30 UTC (Thu)
by robbe (guest, #16131)
[Link] (1 responses)
Unfortunately, the employer will just stay with IE in this case. Not installing Firefox is certainly easier than rolling it out *and* fudging one or more certificates into its trusted store.
Maybe a better way is to make adding a MITM cert easier, but show a different visual cue in the "security indicator" next to the URL. Example:
Padlock: we're pretty sure nobody can listen in
Posted Mar 26, 2015 22:19 UTC (Thu)
by josh (subscriber, #17465)
[Link]
As far as the right to do so: in my opinion, the provider of a network can intercept traffic if they want, but should not be allowed to do so without notice and consent.
Posted Mar 25, 2015 11:52 UTC (Wed)
by rich0 (guest, #55509)
[Link]
Posted Mar 25, 2015 12:34 UTC (Wed)
by gerv (guest, #3376)
[Link]
Gerv
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
> that's why you use your own certificate chain and add it to the machines
> somehow (even on BYOD setups).
Me: You must turn on HTTPS inspection for that to work.
Customer: But the manual says I then have to install a certificate on every device. That's so much bother! Isn't there a better way?
Me: No legal one, no.
² If I do e-banking from this MITM-ready device, non-repudiation conveniently goes out the window.
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Stethoscope: someone is watching your decrypted traffic, ostensibly for malware, but insulting your boss or planning a coup is probably not a good idea either
Megaphone: only politeness protects you, don't do anything you wouldn't do in the cafeteria
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security