[Infowarrior] - .Major break in MD5 signed x.509 certificates
Richard Forno
rforno at infowarrior.org
Tue Dec 30 15:30:47 UTC 2008
Major break in MD5 signed x.509 certificates
http://www.veracode.com/blog/2008/12/major-break-in-md5-signed-x509-certificates/
by Chris Wysopal
December 30, 2008
Jacob Appelbaum and Alexander Sotirov just gave a presentation at the
Chaos Communications Congress in Germany. They have implemented a
practical MD5 collision attack on x.509 certificates. All major
browsers accept MD5 signatures on certs even though it has been shown
to have the collision problem for almost 2 years now. If you can
generate your own x.509 certificates you can perform perfect MITM
attacks on SSL. They went one better and generated an intermediate
certificate authority certificate so they could sign their own
certificates. This way they only need to do the attack once and can
create as many valid certificates as they want.
6 Certificate Authorities are still using MD5 signing: RapidSSL,
FreeSSL, TrustCenter, RSA Data Security, Thawte, verisign.co.jp. They
are not going to be happy about this new attack. They decided to
target RapidSSL because they were able to better predict some of the
certificate fields (serial number and time) because of the way
RapidSSL issues the certificates. They were able to perform the
computations required with 200 Playstation 3s over 1-2 days. Its
estimated to be the same as 8000 Intel cores or $20,000 on Amazon EC2.
They ask the question, “Can we trust anything signed with a cert
issued by a CA that signed with MD5 signatures in the last couple of
years?” The effected CAs have been notified and are going to switch to
SHA-1. They also ask the question, “Why did it take an implemented
attack to get the CAs to switch to SHA-1?” After all the attack has
been known for almost 2 years now. We used the slogan, “Making the
theoretical practical since 1992” at L0pht Heavy Industries to
highlight the need to implement attacks to get some organizations to
improve the security of the implement. It is a bit sad to see that in
2008 demonstration is still necessary.
The researchers were worried about reprecussions by the CAs that might
want to gag them. They had Mozilla and Microsoft sign NDAs that they
wouldn’t tell the CAs about the problem until they could give their
presentation. They think researchers should consider NDAs with vendors
for protection.
You can see a demo of their forged cert here: https://i.broke.the.internet.and.all.i.got.was.this.t-shirt.phreedom.org/
They purposely dated the cert to expire on 9/1/2004 so you need to
back date your machine for it to be validated properly.
More information about the Infowarrior
mailing list