Sunday, April 26. 2015How Kaspersky makes you vulnerable to the FREAK attack and other ways Antivirus software lowers your HTTPS securityComments
Display comments as
(Linear | Threaded)
I am also concerned, both about the technical dangers, and the ethical ones. But if unauthorized traffic is encrypted, what technical solution can we (the security community) use instead?
Solely relying on connection metadata (source/dest IP, port, time of day, source user, destination domain, etc.) is no longer sufficient. Attackers move quickly to emulate legitimate metadata in order to to avoid detection. And relying on IP whitelisting is hard in the new cloud era. Direct inspection -- at the application layer, and the payload itself -- is a way to differentiate between "good" encrypted traffic (legitimate, authorized use) and "bad" encrypted traffic (exfiltration, command and control traffic, etc.) If we cannot intercept, what else can we do?
The first question is: What do you want to do and is that legit at all? It's the point of encrypted connections to guarantee authenticity of the data. You need a damn good reason to change that.
For the antivirus applications: I think the approach to security is wrong to begin with. Fix security vulnerabilities in the browser/OS, don't try to filter malicious software later on. You'll always loose on that. When you want to do filtering like ad-blockers etc.: Create a browser plugin and filter at the endpoint.
I do not disagree with you in principle. What you are describing works well for personal users in a home environment. But in a larger organization or company, I am unsure how to fully resolve the conflict between protection of individual privacy and the obligation to protect the assets and reputation of the organization, without at least some use of SSL intercept.
Internal actors, or attackers with stolen credentials, can avoid exploiting vulnerabilities or using malware. They can use only the tools already available to the user whose credentials they have stolen. Fixing security vulnerabilities is insufficient. Without SSL intercept, DLP is very difficult. Vast amounts of PII, credit card numbers, or intellectual property can leave the environment undetected. And if you cannot prove which information was accessed and exfiltrated, then by law in some jurisdictions, you must assume the worst case (that *all* of the information was exfiltrated). This can have significant legal, financial, and reputational consequences. One partial solution is to create a separate network for personal Internet use while at work. For the internal network, enable SSL intercept, and build an explicit whitelist of all connections that are allowed to use encryption from the organization's internal network, disallowing *all* other encryption or personal site use there. This is a compromise that is an inconvenience for users, but it may be the only currently practical method to avoid tampering with authenticity and invasion of privacy, while still protecting the organization.
If I understand it correctly your concern is that you have internet-connected machines with people working on them that you don't trust and they have access to sensitive data.
Now I would question if this is an especially wise setting. But given what you say I assume you have full control over the machines and the users ony have limited control. Because if the latter wouldn't be the case you have lost already. What you could do is implement some kind of browser-plugin based solution. I'm not sure how feasible it is to implement a browser plugin that the user can't disable, but there probably is a way. But I really find your scenario hard to imagine in practise. You'd also have to prevent people from bringing cameras with them or use any software that they could use to obfuscate data and hide it in other data.
I checked my certificate manager, shocked to see root CA certificate installed by my anti-ads software - Adguard!
It looks to be working as what you wrote, a MITM attack software to block ads but there was no warning or asking me for permission during the install. Much thanks if you can do a quick analysis to see how good or bad it works.
Had a look at it. It's bad. It's bad in a very interesting and creative way.
If you have adguard installed: Remove it together with its cert immediately. It's a huge security risk. I'll post details later.
> What do you want to do?
Parental control. > Is that legit at all? It is actually required by the applicable laws in some jurisdictions for schools, and blocking all HTTPS traffic, or all HTTPS traffic to some domains, is not an option. In my opinion, the real problem is the lack of the way to both do the MITM and to give the browser a chance to make negative decisions based on the original certificate (of course, with the knowledge that the connection is MITMed by this particular party).
If there is a law that requires you to compromise your IT security that's just stupid. I refuse to make any suggestions how technology can fix that. I don't see this as any kind of argument for a broken approach.
Simple: browsers should support traffic scanning, providing anti-virus software access to the decrypted data before using it in any way.
I wouldn't worry to much about cyber criminals buying an EV certificate to deliver malware; the Extended Validation ceritificates are quite costly to come by, only work for a single (sub)domain (no wildcard) and requires an extensive validation (hence the name) that a company is really existant and has requested the certificate.
Save hacking a web server with an EV certificate, using EV to conceal malicious traffic is just too costly. And if some of the few domains with EV certificates are hacked, they should be easy enough to blacklist; it isn't like you can obtain a new EV certificate instantly. (At least, I hope so.) Using obfuscation techniques to conceal malware and exploits will be more cost-effective for cyber crimials in most (if not all) cases.
It breaks DANE (DNS-based Authentication of Named Entities) or makes it impossible to use.
As Hanno said, the right approach for signaturebased- and heuristic antivirus products is to examine local content and not traffic. A browser-plugin can inspect without breaking TLS. The plugin may introduce other vulnerabilities into the browser too, btdt - that is another story. If you try to rely on antivirus products, your security won't work and will break, because antiviri even with heuristics only work against known threats and provide no other security or mitigation options. Speaking of most browsers, Firefox and Chrome have integrated databases (bloomfilters) for malicous sites and webforgeries and apis (plugins and extensions) that let you intercept content at any point. Intercepting into a certificate based a trust-model like TLS is the wrong way. It doesn't work on a standalone networked computer, it barely works in a separated networked setting. For parental controls in schools, the kids nowadays have smartphones. There is a reason it is called parental control, because parents should be involved in it. If you like to filter content, there are ratings and dns-services available that provide a white internet. As a concerned parent you are better off to educate your kid/s as to censor or spy on them. The pricing of certificates provides no additonal security, neither does the review process.
ESET is aware of the issue with TLS 1.2 support and a fix will be available soon.
But anyway this only affects Firefox users. Other browsers should be able to use up to TLS 1.2 without any issues. More information: https://forum.eset.com/topic/4234-ssl-inspection-tls-12-support/ Also EV certificates are scanned by ESET. More information here: https://forum.eset.com/topic/4806-ways-anti-virus-software-lowers-your-https-security/
Regarding school filtering and MITM.. I just found out today that fortinet fortiguard does no https certificate checking whatsoever.
Sigh...
This kind of proves your point:
https://docs.google.com/a/wimdu.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit#gid=1053404143 That's a list with Android apps failing to validate SSL correctly. Among those are about 34 anti virus apps. |
About meYou can find my web page with links to my work as a journalist at https://hboeck.de/.
You may also find my newsletter about climate change and decarbonization technologies interesting. Hanno Böck mail: hanno@hboeck.de Hanno on Mastodon Impressum Show tagged entries |
Tracked: May 01, 21:53
Tracked: May 04, 12:13
In February the discovery of a software called Superfish caused widespread attention. Superfish caused a severe security vulnerability by intercepting HTTPS connections with a Man-in-the-Middle-certificate. The certificate and the corresponding private ke
Tracked: Aug 13, 00:45