TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

CA Comodo used broken OCR and issued certificates to the wrong people

336 pointsby longwaveover 8 years ago

24 comments

nneonneoover 8 years ago
Relevant mailing list post: <a href="https:&#x2F;&#x2F;www.mail-archive.com&#x2F;dev-security-policy@lists.mozilla.org&#x2F;msg04654.html" rel="nofollow">https:&#x2F;&#x2F;www.mail-archive.com&#x2F;dev-security-policy@lists.mozil...</a><p>In this email, Comodo discloses the security issue to Mozilla. The email was sent 26 days after researchers Florian Heinz and Martin Kluge of Vautron Rechenzentrum AG informed them of the bug.<p>Comodo clearly states that they used OCR for .eu and .be domains because the TLD registrars redacted their port 43 WHOIS data, and only provided an image of an email address on their web WHOIS pages. There was apparently no other way to obtain the email address.<p>Rather than flag humans to fix OCR in ambiguous situations, they had automated heuristics to correct the OCR, as determined by the security researchers. However, the heuristics chose the wrong output for the domain @a1telekom.at, producing @altelekom.at (an L instead of a one). The researchers registered altelekom.at and obtained a cert for a domain owned by A1 Telekom, a major ISP.
评论 #12765544 未加载
taurathover 8 years ago
&gt;The OCR has a reproducible bug and has trouble differentiating small l and the number 1. It also has trouble differentiating the number 0 and the small o. Instead of fixing the bug or not using such obviously unsuitable software the software apparently evaluates the following characters - if there is a number after the small l it reads the l as the number 1. Similar issues with o&#x2F;0.<p>So what they&#x27;re saying is y0u can fo0l their servers with 1eetspeak?
评论 #12763437 未加载
评论 #12763580 未加载
johnwheelerover 8 years ago
+1 for <a href="https:&#x2F;&#x2F;letsencrypt.org" rel="nofollow">https:&#x2F;&#x2F;letsencrypt.org</a>
评论 #12762036 未加载
评论 #12763096 未加载
评论 #12765216 未加载
评论 #12764886 未加载
评论 #12763317 未加载
codegeekover 8 years ago
I am usually not good with donations but one company that I gladly donated to has been letsencrypt. They have made life so simple. Please donate[0] or become a sponsor[1] if you can.<p>[0] <a href="https:&#x2F;&#x2F;letsencrypt.org&#x2F;donate&#x2F;" rel="nofollow">https:&#x2F;&#x2F;letsencrypt.org&#x2F;donate&#x2F;</a><p>[1] <a href="https:&#x2F;&#x2F;letsencrypt.org&#x2F;become-a-sponsor&#x2F;" rel="nofollow">https:&#x2F;&#x2F;letsencrypt.org&#x2F;become-a-sponsor&#x2F;</a>
评论 #12762659 未加载
oxguy3over 8 years ago
For the love of God, why has Mozilla not suspended Comodo yet? Too big to fail, my ass -- give a few months of warning before the notBefore cutoff date, and everyone will have plenty of time to switch over to a competent CA.
评论 #12763234 未加载
评论 #12764394 未加载
asidialiover 8 years ago
Comodo should be put out of business. They stole $100 from me for a certificate then gave me the run around for months while I tried to get a refund for a certificate I never received. Still haven&#x27;t gotten my money back.
评论 #12761888 未加载
评论 #12761885 未加载
评论 #12765444 未加载
评论 #12762411 未加载
longwaveover 8 years ago
The underlying issue here is that WHOIS is still not standardised despite being around for over 30 years, and the registrars do not have any other common interface that can be used to discover domain owners and other metadata. Is there no workable solution to this problem?
评论 #12761755 未加载
评论 #12761915 未加载
评论 #12761933 未加载
评论 #12762084 未加载
评论 #12762356 未加载
djsumdogover 8 years ago
Universities that are part of InCommon paid to get unlimited Comodo SSL certs. Their API was pretty terrible and we ended up finding quite a few issues.<p>Every time I hear about these Comodo breaches, I&#x27;m not surprised. Supposedly, Iran was able to get them to issue fake certs for some major sites:<p><a href="http:&#x2F;&#x2F;www.pcmag.com&#x2F;article2&#x2F;0,2817,2382518,00.asp" rel="nofollow">http:&#x2F;&#x2F;www.pcmag.com&#x2F;article2&#x2F;0,2817,2382518,00.asp</a>
corditeover 8 years ago
Should being part of a CA include having a red team constantly trying to breach things?
评论 #12761864 未加载
评论 #12761766 未加载
评论 #12762090 未加载
ig1over 8 years ago
Previously from Comodo:<p><a href="http:&#x2F;&#x2F;www.pcworld.com&#x2F;article&#x2F;2887632&#x2F;secure-advertising-tool-privdog-compromises-https-security.html" rel="nofollow">http:&#x2F;&#x2F;www.pcworld.com&#x2F;article&#x2F;2887632&#x2F;secure-advertising-to...</a>
ComodoHackerover 8 years ago
I&#x27;d like to know how other CAs perform domain validation for .be and .eu TLDs.<p>Disclaimer: not associated with Comodo in any way.
评论 #12762907 未加载
评论 #12764230 未加载
评论 #12762941 未加载
ungzdover 8 years ago
So stupid anti-spam measure — email addresses as image — led (indirectly) to such huge vulnerability.
评论 #12761821 未加载
chetanahujaover 8 years ago
Web security based on PKI model based on 100&#x27;s of &quot;trusted&quot; authorities is just broken. And yet, the &quot;security industry&quot; continues doubling down on &quot;moar TLS&quot; &quot;moar green locks&quot; model instead of coming up with a better model.<p>The tragedy is, that most of the internet access is now happening from mobile devices and majority of <i>that</i> is coming from native apps. The apps need neither the same trust model nor have any &quot;green locks&quot;. But PKI&#x2F;TLS based orthodoxy has such a death grip on the industry that people continue to use this broken model for native apps where it makes even less sense than it does for browsers.
评论 #12766629 未加载
评论 #12763717 未加载
评论 #12765001 未加载
评论 #12763198 未加载
评论 #12765002 未加载
Johnny555over 8 years ago
Did Comodo admit to using OCR for this, and that it wasn&#x27;t a human transcription mistake (humans mistake 1&#x27;s and l&#x27;s too)<p>It just seems odd for them to use an image of a web page to transcribe information from a web lookup when they could just scrape the text off the web page directly without using the intermediate image and OCR.<p>However, I could see them using a human in the chain to look up the whois information, it just seems strange to come up with a complicated OCR solution (and if they did, that they couldn&#x27;t find a font that makes 1&#x27;s and l&#x27;s look more distinct, like <a href="http:&#x2F;&#x2F;forum.high-logic.com&#x2F;viewtopic.php?t=4004" rel="nofollow">http:&#x2F;&#x2F;forum.high-logic.com&#x2F;viewtopic.php?t=4004</a>)
评论 #12764142 未加载
orfover 8 years ago
Isnt this is the same company that produced a &#x27;secure&#x27; browser that disabled CORS?<p>Doesn&#x27;t surprise me.
评论 #12762283 未加载
评论 #12764050 未加载
cikover 8 years ago
And yet somehow browsers have decided that self-signed certificates are less valuable that purchased ones. Seriously?
评论 #12761575 未加载
评论 #12761825 未加载
评论 #12761563 未加载
评论 #12762635 未加载
评论 #12761585 未加载
评论 #12764256 未加载
andrewmcwattersover 8 years ago
Have CAs always been this sloppy or are we just hearing about it more nowadays?
评论 #12763951 未加载
评论 #12765790 未加载
zokierover 8 years ago
More worrying than some OCR silliness is that Comodo is issuing certificates based solely on WHOIS data. I don&#x27;t think it is intended for such security critical use.
评论 #12762180 未加载
drumttocs8over 8 years ago
Comodo is awful. I remember loving their original products, but it&#x27;s been downhill ever since they started trying to monetize so heavily.
abricotover 8 years ago
pranjalv123 called it: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=6620467" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=6620467</a>
bandramiover 8 years ago
How people still think the PKI system is actually delivering security is beyond me.<p>We have <i>zero</i> idea how many bad certs like this may be out there (the nefarious people won&#x27;t publish their results, after all), and yet a browser will still treat a Comodo cert as better than a self-signed one (it&#x27;s identical to a self-signed cert, since Comodo is a known bad actor now). It&#x27;s better than plaintext, of course, but that&#x27;s not saying much.
评论 #12762240 未加载
评论 #12763150 未加载
评论 #12762324 未加载
garaetjjteover 8 years ago
How even whois verification works? It don&#x27;t contains email of domain registrar, not registrant?
retoxover 8 years ago
Yet another in the long line of fuckups.
omouseover 8 years ago
Not surprised, they seem like a shady outfit.