Create an Account
username: password:
 
  MemeStreams Logo

Errata Security: Versign's Bad Response to the MD5-SSL Crisis

search

Rattle
Picture of Rattle
Rattle's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Rattle's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
  Music
Business
  Tech Industry
  Telecom Industry
Games
Health and Wellness
Holidays
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
Recreation
  Travel
Local Information
  SF Bay Area
   SF Bay Area News
Science
  Biology
  History
  Nano Tech
  Physics
  Space
Society
  Economics
  Futurism
  International Relations
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Security
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Cyber-Culture
   PC Hardware
   Computer Networking
   Macintosh
   Linux
   Software Development
    Open Source Development
    Perl Programming
    PHP Programming
   Spam
   Web Design
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Errata Security: Versign's Bad Response to the MD5-SSL Crisis
Topic: Miscellaneous 4:20 pm EST, Jan  9, 2009

This whole situation is quite interesting to me. Several years ago I gave a talk at PhreakNIC about how security researchers can make themselves a hard target to silence. Ironically, the video recorder malfunctioned about an hour before my talk, so there isn't a record of it.

From the looks of it, these guys planned this out well.. Verisign is just spinning this so they don't look like idiots. Don't see a valid argument that the security researchers were in any way unethical. I think concerns about Verisign attempting to obtain some kind of prior restraint on the researchers was completely warranted. Beyond that, given that the problem could be fixed long before their research could be replicated, no actual vulnerability was created by their disclosure.

Here is more information and commentary from Decius:

I previously commented on Verisign's incredulity at the fact that the researchers who produced a phoney SSL certificate didn't put them in the loop prior to public disclosure of their research.

It appears this incredulity has produced a bit of a debate. I'm linking Rob Graham who weighed in the subject:

The researchers behaved perfectly and responsibly. Their worry about being suppressed was justified, and their secrecy was an appropriate response. The very fact that Versign could quickly fix the problem in a day, but malicious hackers would need at least a month to replicate the feat, means that notifying Verisign ahead of time wasn't needed.

He links to a post from Alexander Sotirov who also took issue with Verisign's position:

In a recent post on his company blog, Verisign's vice president of marketing Tim Callan commented on the disclosure of our MD5 collision attack:

VeriSign did not receive any of [the] information ahead of the actual presentation, rendering it impossible for us to begin work on mitigating this issue prior to this morning.

I feel that this statement is inaccurate. Not only did we contact Verisign before our presentation to let them know about our research, we also strongly advised them to stop using MD5 as soon as possible and were given a chance to review their mitigation plans.

Callan responded in the thread on his blog.

Here are the facts as I understand them.

- The "trusted intermediary" was under a strict NDA with you and didn't feel it could reveal anything that was actually actionable or useful. Your NDA prevented the intermediary from telling us what would be announced, by whom, or when.

- You didn't invite us to view the presentation in person or on the webcast. Had VeriSign not discovered by other means that this presentation was coming, we may not have had the opportunity to hear what you had to say until after the fact.

- In addition to Microsoft and Mozilla, at a bare minimum you briefed The Washington Post, Wired Magazine, CNET, and IDG News Service prior to your announcement. You also briefed one or more active security bloggers. Based on the reports from these people, it appears that you obtained promises from them not to share with us either.

- You stood on stage in front of a room full of people and explained that you had actively sought to prevent us from finding out. You had a slide thanking the lawyers who helped you prevent us from finding out.

- VeriSign acquired the RapidSSL product line as part of its acquisition of GeoTrust in September of 2006. That's when we began our process of learning the code base and transitioning various technology decisions that had been made by the previous ownership, including moving off MD5. Therefore it gives an inaccurate impression to discuss 2004 as the starting date for mitigation of this vulnerability.

- VeriSign has a long history of treating ethical security researchers well and encouraging research of this sort. We've been public in our congratulation of the good work you did finding this flaw, and we took immediate action. Had we been briefed ahead of time, the flaw would have been inactive by the time you revealed it to the world.

Verisign was told that the researchers had achieved

the successful generation of colliding x509 certificates signed by real certificate authorities which still use MD5

and that

RapidSSL and FreeSSL (also owned by Geotrust) use MD5 and are vulnerable to this attack

and they were told that this information was going public. I don't understand how knowing "who was presenting and when they were presenting" would effect the situation unless they didn't believe that the results were real, something that they didn't indicate in the email dialog. They had the technical information. What they didn't know is where to sue, which is exactly why they didn't know it. I don't find Verisign's position credible. How would knowing who and when help them react more quickly?

Errata Security: Versign's Bad Response to the MD5-SSL Crisis



 
 
Powered By Industrial Memetics
RSS2.0