On Thu, 26 May 2011, Brent Chapman wrote:

Gene raises valid considerations, but I think they miss the point in this
particular circumstance.

If you don't want to use SSL, don't publish https://... URLs.  If you
publish https://... URLs, make sure your certs are correct (i.e., that they
haven't expired, that you have wildcard certs if needed, etc.).

even a self-signed cert would be better than using a cert with some other name in it.

using the wrong cert is just wrong, in all cases.

if you just want encryption to protect yourself from passive sniffing and don't care about man-in-the-middle attacks, then you can use a self-signed cert.

Or as Brent notes, you could get a wildcard cert.

LOPSA could fix this in either of two ways: fix the certs, or fix the URLs.
The latter doesn't address the URLs that they've already published;
therefore, I'd say that the former is the preferable fix.

It reflects badly on us (LOPSA) that we don't get this right, and damages
our credibility; it's a fundamental sysadmin thing.

I agree with both of these statements.

David Lang


-Brent

On Thu, May 26, 2011 at 5:13 AM, <[email protected]> wrote:

Susan Baur made the following keystrokes:
>Am I the only one who finds it ironic that I need to manually
>accept an "untrusted" certificate to sign up for the security
>discussion mailing list? (The domain is lists.lopsa.org and the
>cert is only valid on lopsa.org.)

Personal opinion only below.  Sorry for the length of this.

There are 2 camps of thought on this.
1. SSL security is meaningful and the only way it will ever
become useful is to lead by example.  Note I didn't say secure.

2. SSL security has never really be trustworthy and the primary reason
it exists is because there are some big companies making lots and lots
of $$$ on selling it.  Why should I spend the money for "show"?

Why should I spend $$$ on something that doesn't involve $$$ in some
form?   Where is my ROI if I spend the $$ to get one?  What's the
possible harm if I don't?   LOPSA needs to consider this in their
overall setup.  Does #1 above mean enough at this point to justify
the expense (initial and renewal) plus maint of the keys?

What's the motivation for someone to attack it?  The only thing they may
get is someones subscription on a mailing list.  Granted they may be
able to harvest passwords out of the mailman setup, but hopefully nobody
is using the same password on a list server as they do for anything
more significant.  This is a listserv for administrators and hopefully
people know better.  It's not like going after Sony or TJMax with the
hope of getting credit card numbers.

The reality of things is that by default most web servers still
provide access to SSL-v2 and very weak ciphers.  Your browser
should negotiate the most secure of these, but the it's up
to the source to disable the insecure if they care.  In most cases
you, the user will never know which is being used.  Are you
really secure, or is this just another case of the 80year old
bank guard standing in the corner with a gun that has no bullets?

I'll contend that a self signed cert on a site that is configured
to disable older protocols and weak ciphers is more secure than
many sites using various default configs.

Next, there isn't anything from stopping a scammer from
registering a domain and getting a valid certificate for their
site.  Send you a little phishing mail informing you of a
problem with your credit card and go to V1SA[.]COM
where they have mirrored the real site and chances are that
even some of those looking for the locks will fall for it.
The cert on the site is even valid, so that indicator is gone.
Don't forget these crews have lots of stolen credit cards, so
it's not costing them anything to buy a valid cert.

As has been mentioned already, most users have been trained
to just click the proceed anyway box on their browser.  Even
many of the big shopping sites get it wrong, esp when they
redirect their web pages on the back end to go off to the IP
based URL instead of their name based system.

Try setting up a proxy service sometime that validates certificates
and see how many of your users complain they can't get to
the business needed to keep your company in operation.

As a final thought on this, even if you have a $$$ cert and
a secure config, can the user really be trusted to have a
secure connection to your system?  One of the big problems
is that most malware makes use of admin permissions to infect
the desktop.  While most people think of keystroke loggers
and bot infections, we have seen where malware will replace
the DNS config to point to servers that redirect your
requests for the bank to their fake servers.  Note if they
can do that, they can also replace the files on your desktop
that contains the keys to certificate verification.  This is
also true for doing DNSSEC verification of the site you
are talking to.  All bets are off with an infected machines.

Again, speaking for myself, not my job.


/~\ The ASCII         Gene Rackow               email: [email protected]
\ / Ribbon Campaign   Cyber Security Office     voice: 630-252-7126
 X  Against HTML      Argonne National Lab
/ \ Email!            9700 S. Cass Ave. / Argonne, IL  60439


_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/


_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to