OpenLeaks doing strange things with SSL

Hanno's Blog

Friday, August 12. 2011

OpenLeaks doing strange things with SSL


Trackbacks

Weblog: techrights.org
Tracked: Aug 16, 13:54
Weblog: thing2thing.com
Tracked: Aug 17, 14:40

Comments
Display comments as (Linear | Threaded)

I'm not saying that i trust openleaks technicians, but trusting SSL for something like this today is the worst mistake you can ever make. SSL is broken, for too many years, stop talking like is a good thing because it only adds a security sense that is not there.
#1 g on 2011-08-15 20:12 (Reply)
no, ssl is not that broken, it works pretty well on most browser.

but the ssl certificate chain management is broken in a "human" way : too many authorities can sign too many domain names with too few controls (see the conference "is ssliverse a safe place" from EFF at the CCC Conference)

but yes, the point of this article stays : openleaks don't know ssl well, which make me fear for the security of submitted material ...
#2 vince on 2011-08-15 22:24 (Reply)
soll jetzt fuer jede test page ein teures cert angeschafft werden?
#3 onkel nr on 2011-08-17 18:50 (Reply)
Ich glaube Du hast das Problem nicht ganz verstanden:
Sie hatten ein "teures" Cert. Sie haben es nur nicht korrekt installiert.
#3.1 Hanno (Homepage) on 2011-08-19 09:06 (Reply)
I don't agree that the message "Before submitting anything verify that the fingerprints of the SSL certificate match!" is completely useless. Seein a matching fingerprint certainly doesn't mean that the line is secure as it might be changed. But seeing a non-matching fingerprint warns me that the connection is rigged. This actually happend to me!

https://twitter.com/#!/lostgen/status/101956044925845504
#4 lostgen (Homepage) on 2011-08-22 11:05 (Reply)
Lostgen, if your connection were compromised, a smart attacker would have changed the fingerprint as well. This implies you will never see a non-matching fingerprint when your connection is compromised by a man-in-the-middle attack.

I'd suggest to armor-sign the fingerprint with PGP (this will even be ok over the very same ssl-connection) - as long as you have verified the key before at least once.

Also, you might want to try perspectives (http://www.heise.de/security/artikel/Perspectives-und-Co-271022.html). It will cross-check the certificate you see with recently-seen certificates by you and others.
#4.1 Ben (Homepage) on 2011-09-02 09:24 (Reply)

Add Comment

E-Mail addresses will not be displayed and will only be used for E-Mail notifications.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

 
 

About

This blog is written by Hanno Böck. Unless noted otherwise, its content is licensed as CC0.

You can find my web page with links to my work as a journalist here.

I am also publishing a newsletter about climate change and decarbonization technologies.

The blog uses the free software Serendipity and is hosted at schokokeks.org.

Hanno on Mastodon | Contact / Imprint | Privacy / Datenschutz