Re: [TLS] Eleven out of every ten SSL certs aren't valid

Martin Rex <mrex@sap.com> Tue, 29 June 2010 13:50 UTC

Return-Path: <mrex@sap.com>
X-Original-To: tls@core3.amsl.com
Delivered-To: tls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DD8093A6BF9 for <tls@core3.amsl.com>; Tue, 29 Jun 2010 06:50:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.903
X-Spam-Level:
X-Spam-Status: No, score=-7.903 tagged_above=-999 required=5 tests=[AWL=-0.068, BAYES_40=-0.185, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vaCRxlZF82Tg for <tls@core3.amsl.com>; Tue, 29 Jun 2010 06:50:25 -0700 (PDT)
Received: from smtpde02.sap-ag.de (smtpde02.sap-ag.de [155.56.68.140]) by core3.amsl.com (Postfix) with ESMTP id 268C93A6C09 for <tls@ietf.org>; Tue, 29 Jun 2010 06:50:24 -0700 (PDT)
Received: from mail.sap.corp by smtpde02.sap-ag.de (26) with ESMTP id o5TDoNer016572 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 29 Jun 2010 15:50:28 +0200 (MEST)
From: Martin Rex <mrex@sap.com>
Message-Id: <201006291350.o5TDoMoO018788@fs4113.wdf.sap.corp>
To: pgut001@cs.auckland.ac.nz
Date: Tue, 29 Jun 2010 15:50:22 +0200
In-Reply-To: <E1OTVaY-0004g3-OW@wintermute02.cs.auckland.ac.nz> from "Peter Gutmann" at Jun 29, 10 07:50:38 pm
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
X-Scanner: Virus Scanner virwal07
X-SAP: out
Cc: tls@ietf.org
Subject: Re: [TLS] Eleven out of every ten SSL certs aren't valid
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: mrex@sap.com
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Jun 2010 13:50:27 -0000

Peter Gutmann wrote:
> 
> In case someone here still hasn't seen this, the subject is a reference to:
> 
>   SSL Certificates In Use Today Aren't All Valid
>   http://www.esecurityplanet.com/features/article.php/3890171/SSL-Certificates-In-Use-Today-Arent-All-Valid.htm
> 
> which posits that only 3% of SSL certs in use today are valid.  The figures
> seem a bit suspicious though, for example they claim 23 million SSL sites
> while the same article quotes Netcraft as claiming there are 1.5 million SSL
> certs in use (the Netcraft figures may be for CA-issued certs only, since they
> quote Verisign as a percentage of that total).  Still, 3% seems pretty low,
> could this be due to something like virtual hosting and the client not sending
> the hostname, thereby getting the wrong cert?  Even with that though, I 
> wouldn't have expected a 97% invalidity rate.

>From the quoted article:

"Only about 3.17 percent of the domain names matched," Ristic said.
(Ivan Ristic, director of engineering at Qualys)
is probably about the scan engine to which an URL was posted to the
TLS mailing list a short while ago:

https://www.ssllabs.com/ssldb/index.html

This is based on the seriously flawed assumption that a DNS entry that
can be resolved into an IP-Address of a machine with a Web-Server on
Port 80 will have the same Web-Server on Port 443 if port 443 is active.

Try "www.oracle.com", "www.googlemail.com", "www.gmx.de".
You can get correct answers for "mail.google.com" and "www.gmx.net".

What is really irritating is that a service like "www.hotmail.com"
is not accessible via TLS _at_all_ and suggests you to enter 
username an password into a plain http form -- OUCH!


-Martin