operation black tulip certificate
play

Operation Black tulip: Certificate authorities loose authority 24th - PowerPoint PPT Presentation

Operation Black tulip: Certificate authorities loose authority 24th Annual FIRST Conference 19 June 2012, Malta Dr. Marnix Dekker, CISA Security expert Information security officer ENISA www.enisa.europa.eu About ENISA o The European


  1. Operation Black tulip: Certificate authorities loose authority 24th Annual FIRST Conference 19 June 2012, Malta Dr. Marnix Dekker, CISA Security expert Information security officer ENISA www.enisa.europa.eu

  2. About ENISA o The European Network and Information Security Agency o gives advice on information security issues o to national authorities, EU institutions, citizens, businesses o acts as a forum for sharing good NIS practices o facilitates information exchange and collaboration o Set up in 2004 – EC proposed a new mandate for 2013. o Around 30 security experts and 20 staff. o ENISA has an advisory role (not operational) and the focus is on prevention and preparedness. 2 www.enisa.europa.eu

  3. About the EU agencies o Set up by EU legislation for very specific technical, scientific or managerial tasks. o For example: o ENISA – European Network and Information Security Agency o CFCA - Community Fisheries Control Agency o EASA - European Aviation Safety Agency o ECDC - European Center for Disease Prevention and Control o EEA - European Environment agency o Et cetera. 3 www.enisa.europa.eu

  4. Black tulips 4 www.enisa.europa.eu

  5. Public key cryptography o Public key crypto is great! o Authenticate and encrypt o user to user (email) o machine to machine (WS) o user to server (login) o server to user (https) o But who uses which key? o To prevent spoofing (MITM) o One solution for this is called PKI o List of <name, key> pairs published by a trusted party (a CA) o Sometimes there is a hierarchy of CAs 5 www.enisa.europa.eu

  6. Wide spread criticism of PKI o PKI is cumbersome for authenticating or authorising users o No anonymous claims of attributes o No distributed trust (I am Bob’s friend) o Alternatives o SPKI (Carl Ellison) o SDSI (Ron Rivest, Butler Lampson) (like SXIP, Identity 2.0) o PGP (Phil Zimmermann) o It is easy to see that PKI does not exploit the great possibilities of public key cryptography o Even worse: the most common use of PKI, HTTPS (SSL + CA’s in the browser + OCSP) is flawed. 6 www.enisa.europa.eu

  7. … and this has been argued in many articles by well known experts. 7 www.enisa.europa.eu

  8. Spy in the middle Matt Blaze http://www.crypto.com/blog/spycerts : “Products o appear sophisticated, mature, and mass- produced… an active vendor community” On CA’s : “a surprisingly large number of root authorities, from o tiny, obscure businesses to various national governments ” Moxie Marlinspike http://blog.thoughtcrime.org/ssl-and-the- o future-of-authenticity : Repeated hacks of CAs, and you don’t even need to hack. 8 www.enisa.europa.eu

  9. And then… 9 www.enisa.europa.eu

  10. MITM on 300.000 Iranians For several weeks in August 2011 10 www.enisa.europa.eu

  11. Dutch eGovernment offline For several weeks in September 2011 11 www.enisa.europa.eu

  12. Impact timeline Security breach at July 2011 Diginotar Privacy breach in Iran August 2011 Outage in the Netherlands September 2011 12 www.enisa.europa.eu

  13. Let’s look at the impact, starting small first… 13 www.enisa.europa.eu

  14. • Bankruptcy for Diginotar • Vasco estimates losses at around 4 million euros Vasco acquired Diginotar for 12 million euros • 14 www.enisa.europa.eu

  15. • eGov outage for millions of users for several weeks • Dutch state claims 9 million euros in damages 15 www.enisa.europa.eu

  16. Mikko Hyppönen : “It is plausible that people died.” 16 www.enisa.europa.eu

  17. Critical information infrastructure: Those interconnected information systems and networks, the disruption or destruction of which would have a serious impact on the health, safety, security, or economic well-being of citizens, or on the effective functioning of government or the economy. (So the CA’s in your country are critical information infrastructure) 17 www.enisa.europa.eu

  18. 18 www.enisa.europa.eu

  19. EU regulation for eID/eSig services o New EU regulation contains: o Breach notification obligation o Appropriate security measures o Summary reporting of breaches to ENISA o Some issues to keep in mind here o Detecting breaches is hard (see Verizon data breach report) o Most breaches are detected by 3 rd parties (92%) o … and only weeks later (85%) o Security measures are difficult to enforce (the devil is in the details of the implementation) o Diginotar was well reputed, frequently audited and found compliant with security standards o We should go from certification to continuous monitoring 19 www.enisa.europa.eu

  20. Is new regulation enough? 20 www.enisa.europa.eu

  21. 600 single points of failure… (meaning: attacker needs to succeed at compromising 1 of 600 to allow attacks on any website!) 21 www.enisa.europa.eu

  22. Job security 22 www.enisa.europa.eu

  23. Aart Jochem (NCSC.nl) @ FIRSTCON 2012: “The Diginotar crisis is over, but the PKI crisis is still ongoing .” 23 www.enisa.europa.eu

  24. Key issues to address… 24 www.enisa.europa.eu

  25. Weakest link? o 600 CA’s in the trusted list of browsers and operating systems o 600 single points of failure o Large CA’s work with hundreds of resellers o Do you even need to hack? 25 www.enisa.europa.eu

  26. Revocation? o Google: “Soft -fail revocation checks are like a seat-belt that snaps when you crash. “ o Hard-fail revocation checks require highly available OCSP responders at CA’s. o Revocation checks add on average 1 second to page loading. o Revocation checks allow CA’s to monitor who visited which websites. o Google Chrome browser dropped OCSP o Can we revoke trust in a CA? Is there a plan? 26 www.enisa.europa.eu

  27. Usability? o Educate the user? o Extended validation certificates, blue bars, green bars, locks, warnings – do they help? o Warnings when there is no attack (bad) o 1 in 300 users disconnected when a NZ banking website showed the wrong certificate for one hour. o No warnings when there is an attack (worse) o No choice for users about which CA’s they trust o So sites have no incentive to use better CAs o So CA’s have no incentive to get better 27 www.enisa.europa.eu

  28. Who do we trust? o Few trusted parties to establish trust between everyone else. o Some very large businesses depend on very small ones, with a tough business model o “ Diginotar earned around 100.000 euros from its certificate business in the first half of 2011. ” o Can these small trusted parties withstand the attack pressure facing billion dollar companies? o Some CA’s can not, TLD’s can (DNSSEC)? o Can we somehow leverage the large user base of the larger websites for conveying trust? 28 www.enisa.europa.eu

  29. Some conclusions o Prepare now for a CA failure! o E.g. have a spare certificate ready for critical sites o Fix HTTPS o it is the foundation of online security o E.g. DNSSEC, DANE, Convergence, Tack o eCommunications go beyond the last mile o Border gateway protocol, Internet exchange points o Routers, datacenters o CA’s, TLD’s, browsers, etc. o EU Internet security strategy o Extending Article 13a beyond telecom sector o Assess what is widely-used critical infrastructure 29 www.enisa.europa.eu

  30. Contact Dr. Marnix Dekker, CISA CIIP and Resilience, ENISA marnix.dekker@enisa.europa.eu www.enisa.europa.eu http://twitter.com/marnixdekker 30 www.enisa.europa.eu

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend