Re: [TLS] Eleven out of every ten SSL certs aren't valid

"Steingruebl, Andy" <asteingruebl@paypal.com> Thu, 01 July 2010 18:05 UTC

Return-Path: <asteingruebl@paypal.com>
X-Original-To: tls@core3.amsl.com
Delivered-To: tls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E4E1D3A6850 for <tls@core3.amsl.com>; Thu, 1 Jul 2010 11:05:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.299
X-Spam-Level:
X-Spam-Status: No, score=-5.299 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SARE_FORGED_PAYPAL_C=1.3]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GEh8kiEabA0n for <tls@core3.amsl.com>; Thu, 1 Jul 2010 11:05:00 -0700 (PDT)
Received: from den-mipot-001.corp.ebay.com (den-mipot-001.corp.ebay.com [216.113.175.152]) by core3.amsl.com (Postfix) with ESMTP id E0D883A6988 for <tls@ietf.org>; Thu, 1 Jul 2010 11:04:59 -0700 (PDT)
DomainKey-Signature: s=ppcorp; d=paypal.com; c=nofws; q=dns; h=X-EBay-Corp:X-IronPort-AV:Received:Received:From:To:Date: Subject:Thread-Topic:Thread-Index:Message-ID: Accept-Language:Content-Language:X-MS-Has-Attach: X-MS-TNEF-Correlator:acceptlanguage:x-ems-proccessed: x-ems-stamp:Content-Type:Content-Transfer-Encoding: MIME-Version:X-CFilter; b=Drk6DijUKkzJ5Z1DmNCLwvUEOrezrKqFEOAOi7HOmVDdprP1PSg6LB+8 vrb14ws3E14928tiMkDAEeyZYEec81XJI2DyKNaYhshApWC1bzAieE6aI vKljmdHBcMKU1O/;
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=paypal.com; i=asteingruebl@paypal.com; q=dns/txt; s=ppcorp; t=1278007511; x=1309543511; h=from:to:date:subject:message-id: content-transfer-encoding:mime-version; z=From:=20"Steingruebl,=20Andy"=20<asteingruebl@paypal.com >|To:=20"tls@ietf.org"=20<tls@ietf.org>|Date:=20Thu,=201 =20Jul=202010=2012:05:09=20-0600|Subject:=20Re:=20[TLS] =20Eleven=20out=20of=20every=20ten=20SSL=20certs=20aren't =20valid|Message-ID:=20<5EE049BA3C6538409BBE6F1760F328ABE A99F4C6D0@DEN-MEXMS-001.corp.ebay.com> |Content-Transfer-Encoding:=20quoted-printable |MIME-Version:=201.0; bh=vSyQrxps8HuYen5LqI+fJCADwVM/qidrzCHRzcoTopU=; b=lMAVnWN/m32HXLz8F15h1jF3L/s2k0TrTcjMrLVSk7XhRdIMOpe0m7tb 6Cgj8L4F1EV2D24vlMmWaKGG5ac1v6WchqICz6PdPVr5umpt1C/Rk/pnv Q+nbOXnl0V03Mfv;
X-EBay-Corp: Yes
X-IronPort-AV: E=Sophos;i="4.53,521,1272870000"; d="scan'208";a="71230072"
Received: from den-vtenf-001.corp.ebay.com (HELO DEN-MEXHT-003.corp.ebay.com) ([10.101.112.212]) by den-mipot-001.corp.ebay.com with ESMTP; 01 Jul 2010 11:05:11 -0700
Received: from DEN-MEXMS-001.corp.ebay.com ([10.241.16.228]) by DEN-MEXHT-003.corp.ebay.com ([10.241.17.54]) with mapi; Thu, 1 Jul 2010 12:05:10 -0600
From: "Steingruebl, Andy" <asteingruebl@paypal.com>
To: "tls@ietf.org" <tls@ietf.org>
Date: Thu, 01 Jul 2010 12:05:09 -0600
Thread-Topic: Re: [TLS] Eleven out of every ten SSL certs aren't valid
Thread-Index: AcsZRxDVpTKzmIFKT3GiISbRXGK0nQ==
Message-ID: <5EE049BA3C6538409BBE6F1760F328ABEA99F4C6D0@DEN-MEXMS-001.corp.ebay.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
x-ems-proccessed: 10SqDH0iR7ekR7SRpKqm5A==
x-ems-stamp: aZtb3UgTizXIxLYz0ZnZiQ==
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter: Scanned
Subject: Re: [TLS] Eleven out of every ten SSL certs aren't valid
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Jul 2010 18:05:01 -0000

Peter said: (combining two different posts)

> his is the same thing, the figure is very meaningful
> because it supports the analysis of the effects of externalities on web site
> security done by some guys at Microsoft Research a few months ago which
> pointed out that since certificate warnings are close to one hundred percent
> false positives (they were aware of no known cases in which someone had been
> saved from being phished by a cert warning),

>  "So Long, And No Thanks for the Externalities: The Rational Rejection of
>  Security Advice by Users", Cormac Herley, Proceedings of the 2009 New
>  Security Paradigms Workshop (NSPW.09), September 2009, p.133.

The problem of course is that this is purely anecdotal.  Cormac didn't cite any research pointers for that, and it is at the heart of the current debate.   If we can actually check for users receiving self-signed certificate warnings when browsing the ordinary web (and perhaps not their corporate intranets) and get some real data about how frequently users actually get these warnings, and/or get MITM'd, then we'd really be getting somewhere.

Frankly, if you think most certificate warnings are false positives, and you also believe that they will forever be such, then why do any certificate verification at all?   This line of reasoning essentially says "there aren't really any active MITM attackers, and won't ever be" so let's just do away with the whole mess of ever checking certificates.

If you want to stop not just attacks today, but attacks that active attackers move to, you need to actually worry about the real numbers here, and the potential for abuse. This does argue for a change in client behavior, but not perhaps in the way some people have suggested - removing all warnings about self-signed certificates.  I don't think that helps us long term.

--
Andy