Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Phishing Scams Incorporate SSL Certificates 316

dettifoss writes "Netcraft reports: `Internet "phishing" scams are incorporating the use of SSL certificates in their efforts to trick users into divulging sensitive login information for financial accounts.' Perhaps more disturbingly: `Scammers can also configure their web server so that deceptive SSL certificates won't trigger an alert in the user's browser. "One of the SSL encoding methods is 'plain text'," Neal Krawetz from Secure Science Corporation noted in the SANS post on the issue. "Most SSL servers have this disabled by default, but most browsers support it. When plain text is used, no central certificate authority is consulted and the user never sees a message asking if a certificate should be accepted.'"
This discussion has been archived. No new comments can be posted.

Phishing Scams Incorporate SSL Certificates

Comments Filter:
  • by ddent ( 166525 ) * on Wednesday March 10, 2004 @12:58AM (#8518082) Homepage

    (Disclaimer: I am probably biased, since we issue
    SSL certificates
    on our website.)



    This article is a good example of yet another reason why the old advice of
    "make sure the site you are dealing with has an ssl certificate, and you
    should be fine" is no longer entirely true.



    To be more confident you are dealing with a reputable/accountable merchant/site, you
    should not only make sure that they have an SSL certificate, but you
    should also actually click on the lock (or however it is done in the browser
    you use) and look at the certificate.



    The reason the advice used to be valid, is that traditionally, to get an SSL
    certificate, you had to provide documents to prove you are who you say you
    are, i.e. DUNS #, articles of incorporation, business license, DBA, bank statement,
    passport, driver's license, whatever. That is still true for most of the
    certificate authorities, but it isn't always true. Some of the new certificate
    authorities don't actually ask to see documents before issuing the
    certificate, instead, they merely make sure that you have control of the
    domain by sending an email to the listed contacts. In some cases, they also
    place a phone call to a number you provide them (I fail to see how this does
    anything, but..). Certificate authorities that do this will issue the
    certificate to "Domain control validated, organization not validated" as the
    organization (or similar text to that effect) rather than to the actual name
    of the company the certificate is for. These certificates are
    perfectly fine for making sure things
    are encrypted, however, they make the certificate useless for getting an idea
    about the legitimacy of who you are dealing with. They also don't tend to
    carry the warranties that other ones do (and for good reason, who would
    underwrite that procedure?).


  • The short (Score:2, Informative)

    by Idealius ( 688975 ) * on Wednesday March 10, 2004 @12:58AM (#8518088) Journal
    Here's the kicker (From Article):

    Netcraft has developed a service to help banks and other financial organizations identify sites which may be trying to construct frauds, identity theft and phishing attacks by pretending to be the bank, or are implying that the site has a relationship with the bank when in fact there is none.

    Here's the competition (From Google):

    About Comodo:
    Comodo is the leading WebTrust-compliant enterprise solutions provider for E-commerce Security Solutions. Firmly established in the market, Comodo markets a range of innovative products and services developed by its dedicated research lab delivering software, hardware, secure messaging and certificate-based security.

    Comodo offers its SEEOS(TM) Secure Enterprise Extensible Operating System for integrated network security, together with secure Linux applications delivered via its Trustix(TM) brand, SIDEN(TM) next generation ASIC, Instant SSL Certificates for securing web servers and patented web site verification and identity solutions. For product information please contact US +1 800 772 5185 or Europe +44 (0) 161 874 7070 or visit the Comodo Home Page at www.comodogroup.com .

    About Betrusted:
    Betrusted is the premier global provider of security and trust services to the world's leading organizations and government agencies. Through its managed security services, Betrusted offers clients a comprehensive package of leading security products coupled with unrivalled expertise to help reduce costs, increase revenues and comply with government and industry regulations. For more information, please visit our website at www.betrusted.com . Betrusted is owned by One Equity Partners, Bank One's private equity group.

    (http://www.instantssl.com/ssl-certificate-news/ss l-120104.html [instantssl.com])
  • by ddent ( 166525 ) on Wednesday March 10, 2004 @01:07AM (#8518125) Homepage
    Gah... I submitted this as HTML but slashcode interpreted it as plaintext and messed up the formatting somehow... sorry!
  • by realdpk ( 116490 ) on Wednesday March 10, 2004 @01:28AM (#8518251) Homepage Journal
    Sometimes all you need is authentication. It would actually be nice if plaintext sites could have plaintext certificates so you'd know you're going to the right place, but still be able to browse without the added encryption overhead with every request.

    There would, of course, need to be a way to easily differentiate between encrypted and non-encrypted sites just like now.
  • by Anonymous Coward on Wednesday March 10, 2004 @01:48AM (#8518364)
    It defaults to poping up a warning that you are using low grade encryption. Plain text qualifies!
  • you are misinformed (Score:4, Informative)

    by wotevah ( 620758 ) on Wednesday March 10, 2004 @01:49AM (#8518369) Journal

    RTFA or quit trolling. The problem is not the SSL certificates or who creates them, but the browsers accepting a "plain" encryption scheme when setting up the secure channel. I haven't actually seen this but it's entirely within reason that a "plain text" encryption was available in the SSL libraries for debugging communications in SSL apps.

    I think it should be fairly simple to update the browsers so they require some encryption by default. Voila. Problem solved and we don't have to kill OpenSSL or "pay a root certificate authority" for the privilege of having encryption.

  • by Anaxagor ( 211917 ) on Wednesday March 10, 2004 @02:02AM (#8518448)
    What are some good resources for a web developer to read so that they know how to design secure sites that use RDBMS as a backend?

    OWASP [owasp.org] is a good start.
  • by rekt ( 760792 ) on Wednesday March 10, 2004 @02:04AM (#8518456)
    An SSL certificate is just a (hopefully long) bit-string formatted in a certain way. I don't see how the fact that anyone can generate a long bit string to a well-known format contributes to the insecurity of SSL.

    If a protocol can be weakened by someone generating a long bit-string, then that protocol isn't worth much in the first place.

    Public knowledge of SSL (incarnated in the openSSL source) is not the problem. Rather, the problem is twofold:

    Uncomprehending users
    End users don't understand PKI, for the most part. They don't understand the implications and assumptions which underly the system. By default, the X.509 architecture means that they end up implicitly trusting the root Certificate Authorities installed by their browser provider (which means they are implicitly trusting their browser provider and we know who that usually is...)
    Untrustworthy Hierarchy in X.509
    The hierarchical nature of SSL's PKI means that even for those people who understand how it works, they are still strongly compelled to trust some large CAs. Sadly, many of the large CAs have abandoned their ideal role of actually establishing and verifying identity. They seem to now see themselves as yet another middleman who deserves a cut of any transaction without providing a service.
    How many times have you seen a CA whose policy for establishing identity amounts to "Please send us a fax on company letterhead" ? Who can't send a fax on "company letterhead" these days?

    I would be willing to pay a good CA for actual verification, even as a client, if i could be sure that they were actually verifying the folks they issued certificates to. But it would need to be big enough to be able to certify a large number of sites to be worthwhile...

    The non-hierarchical nature of the web of trust [gnupg.org] model of PKI is so much better than X.509, so it would fix the untrustworthy hierarchy issue above. But, even more than X.509, it expects all the end users to understand the basic ideas of PKI, not just "look for the little lock and click those dialogs as soon as they come up". sigh...

  • Re:It doesn't matter (Score:5, Informative)

    by PacoTaco ( 577292 ) on Wednesday March 10, 2004 @02:08AM (#8518472)
    Who ever ASKS YOU for your login information?

    Verisign does. After failing to get an account migration problem fixed via email, I finally resorted to calling them. The rep asked for my username and password to verify my identity and couldn't understand why I refused to give out my password over the phone. I asked him if the passwords were stored in their database in plaintext or if he was going to check it by logging on, but he wouldn't tell me.

  • by Vegeta99 ( 219501 ) <rjlynn@@@gmail...com> on Wednesday March 10, 2004 @02:08AM (#8518477)
    Well, these 'phishers' would make up a url.. something like http://www.eonlinebank.com (and then, insert a bunch of spaces)@theirsite.com/

    Their site would be an exact replica meant to steal your information. So, firms would beat into their customers to look for the 'lock' or the https:// before a URL to make sure that it was the right site.

    With plain text encoding on an https site, you still get the comfort factor of the lock (i think), and the https://, so once again, the morons who don't look at the complete URL are going to be victimized.

    IE had a bug where a certian control code would make the second part of the url (the @and everything after it) completely invisible. This has been fixed.
  • by realdpk ( 116490 ) on Wednesday March 10, 2004 @02:27AM (#8518558) Homepage Journal
    In Mozilla 1.5a at least, in preferences under SSL, in the tab "Extra SSL3/TLS" the only two options that are labeled "No encryption" are deselected for me - I am certain I didn't do this myself, it was probably that way stock.

    I do not see anything in IE's config to disallow this, except perhaps disabling SSL3 all together. That seems excessive. I hope someone can post a correction to this. :)
  • by ddent ( 166525 ) * on Wednesday March 10, 2004 @02:31AM (#8518571) Homepage
    I've actually often thought how our business would be a good one to run if we were identity thieves. Very, very few of our customers have pose any questions about giving us the documents we ask of them. Fortunately, we are not, and we are also very careful with our document retention/storage policies.

    I agree ethics in business is important.. witness Worldcom and Enron if you want something more recent than the 1980s.

    We don't charge the wads of do some companies do, but I would like to think we are both competent and trustworthy.

    But I ask: If you are not going to judge a CA by the procedures they use to issue certificates, then how are you going to judge them (and the certificates they issue, and the holders of those certificates)? I would suggest that there is little else in the way of quantifiable properties that people can go on...
  • Tip for Safari users (Score:5, Informative)

    by Concerned Onlooker ( 473481 ) on Wednesday March 10, 2004 @03:19AM (#8518744) Homepage Journal
    I couldn't find a way to view the site certificate in Safari when the padlock was showing, but if you have the Debug menu enabled you can go to Debug-->Security and set it to perform strict certificate checks. The default setting was "Allows expired root certificates."

    To enable the Debug menu see this tip [macosxhints.com].

  • by BZ ( 40346 ) on Wednesday March 10, 2004 @03:21AM (#8518750)
    > Even the final order form page is sent over HTTP, > but the form POST is set to use HTTPS.

    Unfortuantely, you have no clue where the form is going to be submitted to.... Just looking at the source is not enough -- there can be an onsubmit handler defined in one of the dozen scripts linked into that page that rewrites the action URI to a (HTTPS, sure) URI pointing at some other server. Like the server of the guy who just performed a man-in-the-middle attack on the unencrypted data channel you and the store were using...

    The only way to prevent this is to serve the page the uset types the credit card number in as https and have the user check that _that_ page is actually what it's claiming to be.

    All this apart from the fact that if you type any text into a web page that web page can immediately phone the text home (using toys like XMLHttpRequest, SOAP, etc). So don't EVER type a credit card number in a page whose origin is not guaranteed.
  • by James_G ( 71902 ) <jamesNO@SPAMglobalmegacorp.org> on Wednesday March 10, 2004 @03:21AM (#8518753)
    The "View partial source" functionality is also available as a plugin for IE. Download it here [microsoft.com].

    Enjoy!

  • by James_G ( 71902 ) <jamesNO@SPAMglobalmegacorp.org> on Wednesday March 10, 2004 @03:25AM (#8518766)
    Oh, and I should note.. it says that the download is only for IE 5.x, but it works fine in IE 6.0 as well. YMMV.
  • Re:Bollocks (Score:2, Informative)

    by bryceh1 ( 736974 ) on Wednesday March 10, 2004 @05:18AM (#8519213)
    DING! DING! DING! The most secure of systems can be brought down by a simple configuration error. TLS/SSL is certainly not to blame here. Instead it's individuals'/vendors' misunderstanding of the TLS/SSL protocol. First let's set one thing straight, it is not encryption at issue here - it is *authentication*. Plain-text SSL encryption has nothing to do with the vulnerability per se. The real problem is the browser's allowance of a "bilaterally anonymous SSL connection". In other words the spoofer's SSL server requests that an authentication handshake is not necessary during the SSL negotiation protocol. That's certainly an allowable configuration option according to the TLS IETF specification, but just because it is defined does not mean it should be an allowed, especially by default. But guess what, that's what the browser vendors have apparently done. BAD! And so easy to fix (about six words in OpenSSL). But this also demonstrates a flawed manner of thinking about client-server trust in WWW computing. Often people assume that SSL protects your "sensitive data" from being pilfered. True in a sense (of course that data ends up sitting plaintext in a non-secure database somewhere overseas), but you can utilize that very same encryption with in a bi-laterally anonymous SSL connection, or in other words SSL/TLS encryption has almost nothing to do with certificates. The problem being missed is one of trust. SSL/TLS (in good practice) should be used to create an encrypted connection with a *trusted party*. What business does a browser have connecting to an anoymous server with SSL/TLS, it completely defeats the purpose of it? The UI fakeouts aside the one, true way to fix this is to ensure that vendors configure their browsers to always require a valid certificate from a server when utilizing a SSL/TLS connection. It would be nice to provide someway to disable this feature for us more security initiated users but the rest of the community would probably never care nor notice. It would also be genuinely nice if user's were educated by their browser during such security incidents. For instance, when the user is conducting an SSL negotation with a nefarious server that offers up a certificate signed by an unknown or untrusted Certificate Authority the browser should be prompt the user to read very carefully the consequences of accepting the server certificate, and why it's not being trusted in the first place - vague dialogues breed bad user actions/reactions and the user is no wiser having clicked a button to make the annoyance go away. In short, hey vendors, don't allow the browsers to ever make SSL/TLS connections with an untrusted party!!!
  • by dmeranda ( 120061 ) on Wednesday March 10, 2004 @05:31AM (#8519265) Homepage
    Actually the NULL encryption algorithm is by default completely disallowed...it is not considered low-grade encryption, since it is in fact NO encryption.

    In Mozilla go to Preferences -> Privacy & Security -> SSL -> Edit Ciphers -> Extra SSL3/TLS.... Then you'll see the two modes of NULL encryption,

    No encryption with RSA authentication and a SHA1 MAC
    No encryption with RSA authentication and a MD5 MAC

    If you click on the cipher details button, you'll see that the effective key size is 0 bits.

    You should also consider disabling SSLv2, since it is cryptographically broken (unless you have to use a site which doesn't support the newer TLS).

    Note that this TLS/SSL non-encryption mode potentially applies to all TLS/SSL-enabled applications, not just web servers/browsers. You could argue that in some of those (such as email SMTP+STARTSSL), that using these modes almost makes sense if all you want is authentication.
  • by Gollum ( 35049 ) on Wednesday March 10, 2004 @05:45AM (#8519321)
    I tried to duplicate this, with no success using either of the abovementioned browsers.

    I tried using

    openssl s_server -nocert -ciphers eNULL:aNULL:NULL -www

    as well as

    openssl s_server -cert mycert.crt -ciphers eNULL:aNULL:NULL -www

    In both cases, both browsers refused to connect, saying that there were no shared algorithms (Firefox), or simply giving a error page (IE).

    In all cases, openssl gave me messages similar to

    332:error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no shared cipher:s3_srvr.c

    Perhaps this does not qualify as "most browsers", but I'm sceptical of this report.
  • Re:It doesn't matter (Score:5, Informative)

    by God! Awful 2 ( 631283 ) on Wednesday March 10, 2004 @06:12AM (#8519400) Journal
    The rep asked for my username and password to verify my identity and couldn't understand why I refused to give out my password over the phone.

    So am I, actually. What you shouldn't do is to give out your password on the phone when someone calls you. That's how they trick you. "Hi, this is so-and-so calling from Verisign. Can I have your date of birth and mother's maiden name?" But if you call them, you know who they are. Who cares if you give out your password over the phone.

    One time at work, I got locked out of my account for typing in my password 3 times (actually it happened quite frequently due to their lame-brain "user must change password every 6 months" policy). I called the help desk to have them reset my password, but they refused to give me the temporary password over the phone.

    I was impressed. After all, they had no confirmation of who I was other than the fact that I was calling from the phone on my desk. So instead they sent me a voice-mail and I had to type in my voice-mail password. But my new found faith in MIS was quashed when I listened to the message: "Your new password is 'password'. That's p-a-s-s-w-o-r-d."

    -a
  • by Anonymous Coward on Wednesday March 10, 2004 @06:29AM (#8519450)
    Interesting read, but that is what CC insurance negates. So what if someone takes your details from a receipt - your CC company will be liable. Do as I do, and pay the $7 a month for the insurance :)
  • by Johnny Mnemonic ( 176043 ) <mdinsmore@NoSPaM.gmail.com> on Wednesday March 10, 2004 @09:19AM (#8520124) Homepage Journal

    You might be interested in the one-time use Credit Card that I have. From MBNA [mbnanetaccess.com], it requires that you get one of their cards, and then sign up for an online account; afterwards, you sign back in to the online page, and then can set limits + expiration dates on any given purchase. I use it whenever a physical card isn't required by the vendor, which includes over the phone transactions etc. Works with my Mac OS X and Safari.
  • by slashkitty ( 21637 ) on Wednesday March 10, 2004 @11:17AM (#8521087) Homepage
    In a related note, you can put a lock icon on a web page with out using ssl at all. Take a look at the Chase Bank Homepage [chase.com]. They put a lock in the login box, making users think that the login box is secure, however, it's not completely secure because it's on an unsecured page. While indead, for most people, the login information will go straight to chase secure servers, it is possible to hack the users session. How? Easy, just modify the chase.com homepage before the user gets it. Either through DNS, proxy or xss. Whatever you do, don't login to your bank account from the chase homepage.
  • by pjkundert ( 597719 ) on Wednesday March 10, 2004 @11:19AM (#8521104) Homepage
    Bruce Schneier has a very interesting article about the "Scam" that is the Public Key Infrastructure.

    Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure [schneier.com]

    This is probably just the first of many security problems resulting from the fact that these PKI issuing authorities are more interested in Money and Marketing, than in actual security...
  • by Nintendork ( 411169 ) on Wednesday March 10, 2004 @11:46AM (#8521363) Homepage
    The way it works is this: Your web browser has a list of trusted Certificate Authority (CA) servers. Any certificate that has been signed by them is automatically trusted to be secure and you don't get any prompts. If a certificate has been signed by another CA that your web browser doesn't have listed as a trusted CA, then you get prompted with a warning outlining the problem. What this article is basically saying is that if the encryption method employed by the web server is "Plain text", then your web browser won't warn you if the certificate was signed by one of those CAs that isn't in your list of trusted CAs. Anyone can be their own CA by issuing a self-signed certificate, removing the need for another entity such as "Slime certificate houses."

    -Lucas

  • by Nintendork ( 411169 ) on Wednesday March 10, 2004 @11:53AM (#8521432) Homepage
    Allow me to correct myself. I hadn't read the story yet and other posts led me to believe that phishers were issuing self-signed certificates. In this case, there is no certificate involved. Plain Text is one of the SSL encryption methods and when used, it doesn't use a certificate. The answer here would be for web browsers to warn the user that the connection is not secure or to reject plain text SSL altogether.

    -Lucas

"God is a comedian playing to an audience too afraid to laugh." - Voltaire

Working...