Nytro Posted September 3, 2014 Report Posted September 3, 2014 Latest Firefox version adds protection against rogue SSL certificatesFirefox 32 has implemented a feature known as certificate key pinning By Jeremy Kirk | IDG News ServiceMozilla has added a defense in its latest version of Firefox that would help prevent hackers from intercepting data intended for major online services. The feature, known as certificate key pinning, allows online services to specify which SSL/TLS (Secure Sockets Layer/Transport Security Layer) certificates are valid for their services. The certificates are used to verify a site is legitimate and to encrypt data traffic. The idea is to prevent attacks such as the one that affected Google in 2011, targeting Gmail users. A Dutch certificate authority (CA), Diginotar, was either tricked or hacked and issued a valid SSL certificate that would work for a Google domain. In theory, that allowed the hackers to set up a fake website that looked like Gmail and didn't trigger a browser warning of an invalid SSL certificate. Security experts have long warned that attacks targeting certificate authorities are a threat. Certificate pinning would have halted that kind of attack, as Firefox would have known Diginotar shouldn't have issued a certificate for Google. In Firefox 32, "if any certificate in the verified certificate chain corresponds to one of the known good (pinned) certificates, Firefox displays the lock icon as normal," wrote Sid Stamm, senior manager of security and privacy engineering at Mozilla, on a company blog. "When the root cert for a pinned site does not match one of the known good CAs, Firefox will reject the connection with a pinning error," he continued. The "pins" for the certificates of online services have to be encoded into Firefox. Firefox 32, released this week, supports Mozilla sites and Twitter. Later Firefox releases will support certificate pinning for Google sites, Tor, Dropbox and others, according to a project wiki.Sursa: Latest Firefox version adds protection against rogue SSL certificates | Applications - InfoWorld Quote
em Posted September 3, 2014 Report Posted September 3, 2014 The "pins" for the certificates of online services have to be encoded into Firefox.Adica o sa aiba in cod indicii despre ce certificate sunt valide? Sa inteleg ca pana acum aveam incedere in autoritatea care a emis certificatul. Acum trebuie sa am incredere si in browser. Ce urmeaza? Sa puna in cod si IP-urile de la mozilla.com setate static? Quote
Nytro Posted September 3, 2014 Author Report Posted September 3, 2014 E bun bre. SSL pinning = hardcoded RootCA/Server certificate.Asta inseamna ca previne Man in the Middle chiar si cu RootCA instalat local (telefon sau calculator). Quote
TheTime Posted September 3, 2014 Report Posted September 3, 2014 Acum trebuie sa am incredere si in browser.Ca idee: daca nu ai incredere intr-un browser, atunci nu ar trebui sa il folosesti deloc. Un browser are multe alte posibilitati sa te pacaleasca. Din postura de proprietar de browser, nu are sens sa iti complici viata cu inlocuirea certificatelor SSL atunci cand poti sa executi cod javascript dupa bunul plac. In definitiv, browserul este o aplicatie instalata pe sistemul tau, aplicatie in care iti introduci mai toate parolele esentiale, deci poate fi un cal troian foarte eficient. Quote
poq Posted September 4, 2014 Report Posted September 4, 2014 Pe versiunea 32 nu merge Live HTTP Headers. Quote