Researchers set to reveal SSL vulnerability
Will demonstrate problem with VPNs at Black Hat conference.
By Tim Greene, Network World | Network World US | Published: 10:10, 17 July 2009
Confidential online connections made from public wireless hotspots remain vulnerable to attacks despite improved security that was supposed to fix the problem, according to security researchers.
The vulnerability means that attackers can lurk in the middle of what victims think are secure SSL sessions with banks, retailers and other secure websites, picking off passwords and other information that can be used later to steal account funds or compromise confidential business data, said researchers, Mark Zusman, a consultant with Intrepidus, and Alexander Sotirov, an independent researcher, who are set to demonstrate their findings next week at the Black Hat security conference.
An improved method of qualifying businesses for SSL certificates - called extended validation (EV) SSL turns the address bar in browsers green to assure users that the connection is in fact being made using EV SSL certificates. It is supposed to indicate that end users are connecting with a legitimate business, not an attacker. To do so, the entity obtaining the SSL certificate has undergone prescribed scrutiny and qualified for the certificate.
Related Articles on Techworld
But a green bar may hide the fact that the browser is actually connecting using SSL certificates approved via the traditional, less secure version of certificate issuance called domain validation (DV), which has no guarantee that such validation criteria were met, Zusman says. Those DV connections can be compromised by attackers.
Fixing the vulnerability is complex and would require all websites to conform, so the best defense is to avoid using insecure public Wi-Fi networks, he said. "Use EVDO [broadband wireless service] or some other mobile broadband service that makes it more difficult to execute this type of attack," he added. "Keep yourself out of situations where attackers can get at you."
To take advantage of this weakness, hackers would set up laptops in a public Wi-Fi zone and use well known methods for compromising the wireless access points such as ARP or DNS spoofing or hacking management platforms.
With control of the DNS for the access point, the attackers can establish their machines as men-in-the-middle, monitoring what victims logged into the access point are up to. They can let victims connect to EV SSL sites - turning the address bars green. Subsequently, they can redirect the connection to a DV SSL sessions under a certificates they have gotten illicitly, but the browser will still show the green bar.
"The scary part is that from the victim's side there's really no sign that anything went wrong unless they look at the EV SSL session on the certificate that is served," Zusman said, which is something most users don't do." After the fact they may see that someone accessed their account, but during the attack it's very difficult to detect."
Attackers could drop malware into victims' browsers that would grab passwords later when they access sensitive sites from secure networks that the attackers have not cracked, he says.
Many websites are hybrid in that EV SSL is required to log in, but elements of the pages are protected by DV SSL certificates. One example is Google Analytics service doesn't require EV SSL to access customer data, but that data could be part of a Web page that does require EV SSL certificates for entry.
"The fix requires pretty basic changes to the way browsers deal with EV certs," Sotirov said. If elements of the page use DV SSL certs, the browser would not display them, which could break web sites. "It wouldn't invalidate the entire site just that part with content from third-party, non-EV SSL servers," he said.
Websites can fix the problem by adopting all EV SSL certs for all the elements of their sites, even those served by third parties. Bu that would require creators of Web sites to find out whether all the elements of their pages use EV SSL certificates. "It is not an upgrade process [Web designers] would likely go through. The web is not good at these upgrades," Satirov said.