Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Alexander Klink (a.klinkcynops.de)
Date: Mon May 26 2008 - 07:57:19 CDT
On Sun, May 25, 2008 at 09:15:55PM +0200, niclas wrote:
> you recently wrote that you tested the CA-certificates - but you didn't
> test the certificates which have been *signed* by the CAs.
I actually tested a few of those and I also found one of a major bank
in Germany to vulnerable for a few hours ...
> I think all servers which had a vulnerable certificate, even for a short
> time, are still not secure - at least as long as the old certificates
> are still valid, which depends on the validity date saved in the
> certificate, only.
Indeed. The one for www.$major_bank.de is still valid for about 3 years.
> No, CRLs don't work. Firefox for example does not check for CRLs
> (default setting), making certificate revocation senseless. I assume,
> other Browsers don't check CRLs either. And what about the german
That is indeed a problem. AFAIK IE 7 on Vista now does some CRL checking
by default, but I haven't tried it yet.
> I think the only option is to change domain names. :-(
For phishing purposes and if we are talking about
www.$companyname.de/.com, this is obviously not a realistic option.
Dipl.-Math. Alexander Klink | IT-Security Engineer | a.klinkcynops.de
mobile: +49 (0)178 2121703 | Cynops GmbH | http://www.cynops.de
HRB 7833, Amtsgericht | USt-Id: DE 213094986 | Geschäftsführer:
Bad Homburg v. d. Höhe | | Martin Bartosch
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/