Jump to content
Nytro

Latest Firefox version adds protection against rogue SSL certificates

Recommended Posts

Latest Firefox version adds protection against rogue SSL certificates

Firefox 32 has implemented a feature known as certificate key pinning

By Jeremy Kirk | IDG News Service

Mozilla has added a defense in its latest version of Firefox that would help prevent hackers from intercepting data intended for major online services.

The feature, known as certificate key pinning, allows online services to specify which SSL/TLS (Secure Sockets Layer/Transport Security Layer) certificates are valid for their services. The certificates are used to verify a site is legitimate and to encrypt data traffic.

The idea is to prevent attacks such as the one that affected Google in 2011, targeting Gmail users. A Dutch certificate authority (CA), Diginotar, was either tricked or hacked and issued a valid SSL certificate that would work for a Google domain.

In theory, that allowed the hackers to set up a fake website that looked like Gmail and didn't trigger a browser warning of an invalid SSL certificate. Security experts have long warned that attacks targeting certificate authorities are a threat.

Certificate pinning would have halted that kind of attack, as Firefox would have known Diginotar shouldn't have issued a certificate for Google.

In Firefox 32, "if any certificate in the verified certificate chain corresponds to one of the known good (pinned) certificates, Firefox displays the lock icon as normal," wrote Sid Stamm, senior manager of security and privacy engineering at Mozilla, on a company blog.

"When the root cert for a pinned site does not match one of the known good CAs, Firefox will reject the connection with a pinning error," he continued.

The "pins" for the certificates of online services have to be encoded into Firefox. Firefox 32, released this week, supports Mozilla sites and Twitter. Later Firefox releases will support certificate pinning for Google sites, Tor, Dropbox and others, according to a project wiki.

Sursa: Latest Firefox version adds protection against rogue SSL certificates | Applications - InfoWorld

Link to comment
Share on other sites

The "pins" for the certificates of online services have to be encoded into Firefox.

Adica o sa aiba in cod indicii despre ce certificate sunt valide?

Sa inteleg ca pana acum aveam incedere in autoritatea care a emis certificatul. Acum trebuie sa am incredere si in browser. Ce urmeaza? Sa puna in cod si IP-urile de la mozilla.com setate static?

Link to comment
Share on other sites

Acum trebuie sa am incredere si in browser.

Ca idee: daca nu ai incredere intr-un browser, atunci nu ar trebui sa il folosesti deloc.

Un browser are multe alte posibilitati sa te pacaleasca. Din postura de proprietar de browser, nu are sens sa iti complici viata cu inlocuirea certificatelor SSL atunci cand poti sa executi cod javascript dupa bunul plac. In definitiv, browserul este o aplicatie instalata pe sistemul tau, aplicatie in care iti introduci mai toate parolele esentiale, deci poate fi un cal troian foarte eficient.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...