TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How I got a valid SSL certificate for my ISP's main domain

68 pointsby mdewinterabout 10 years ago

13 comments

agwaabout 10 years ago
Disclosing the private key in this blog post was extremely irresponsible. Although the certificate has been revoked, revocation basically doesn&#x27;t work[1], so for practical purposes this key will usable for MitM until it expires on Mar 19, 2016. Hopefully browser vendors will push out updates that explicitly blacklist it (Chrome is pretty proactive about this, not sure about other browsers), but that won&#x27;t help non-browser clients or users running out-of-date browsers.<p>If you ever do this, please, please destroy the private key immediately. There are other ways to prove you had possession of it, such as by signing something with it.<p>[1] <a href="https://www.imperialviolet.org/2014/04/29/revocationagain.html" rel="nofollow">https:&#x2F;&#x2F;www.imperialviolet.org&#x2F;2014&#x2F;04&#x2F;29&#x2F;revocationagain.ht...</a>
评论 #9243048 未加载
评论 #9243276 未加载
评论 #9243477 未加载
评论 #9243020 未加载
评论 #9243600 未加载
nailerabout 10 years ago
This exact attack was used on obtain a certificate for login.live.com, Microsoft&#x27;s single sign on site used by millions of people, in 2008 by Mike Zusman. See <a href="https://books.google.co.uk/books?id=fQOLBAAAQBAJ&amp;pg=PA88&amp;lpg=PA88&amp;dq=login.live.com+mike+zusman&amp;source=bl&amp;ots=sFdqVRylJ4&amp;sig=21jZ5C4rGZ_eMtX8dt-Myzwhoks&amp;hl=en&amp;sa=X&amp;ei=rooNVaefCsieywOh5IGQCg&amp;ved=0CCgQ6AEwBA" rel="nofollow">https:&#x2F;&#x2F;books.google.co.uk&#x2F;books?id=fQOLBAAAQBAJ&amp;pg=PA88&amp;lpg...</a><p>Domain validated SSL was always a bad idea. Disclaimer: I sell EV SSL validation.
评论 #9243147 未加载
评论 #9243110 未加载
评论 #9242953 未加载
评论 #9244429 未加载
评论 #9242942 未加载
tbrownawabout 10 years ago
Of all the CAs my browser trusts, <i>any single one</i> of them can compromise the entire web by fucking up and issuing bad certificates.<p>I have no say in which CAs I &quot;trust&quot;, since my list has to match the list that site owners pick from. Site owners have no benefit from picking better CAs on the list over worse CAs also on the list, because my browser trusts them the same.<p>How could <i>anyone</i> think this is a good system!?<p>[Edit: and yeah, things like cert pinning can mitigate the damage a bit. That&#x27;s not enough to make a bad idea suddenly a good idea, and it only took approximately forever to start being implemented.]
评论 #9243978 未加载
评论 #9242906 未加载
rgjabout 10 years ago
When another Dutch ISP launched in 1998, I was able to register the root@ email address and a friend of mine got info@. It took them over one year to figure out that they might want to take those away from us.<p>Surprising to hear that this is still possible all those years later, especially with an ISP like xs4all.nl. Those guys always had a good reputation, security-wise. I see they still have the tradition that you get an apple pie for responsible disclosure (<a href="https://www.xs4all.nl/over-xs4all/beleid/responsibledisclosure/" rel="nofollow">https:&#x2F;&#x2F;www.xs4all.nl&#x2F;over-xs4all&#x2F;beleid&#x2F;responsibledisclosu...</a>). So bon appetit!
评论 #9243334 未加载
aglabout 10 years ago
I&#x27;m looking into a CRLSet push to block this certificate in Chrome now.
评论 #9243216 未加载
joostersabout 10 years ago
Is there any way to discover a list of SSL certs that have been issued for a domain?<p>The problem here is, once someone has shown that they could receive emails for administrator@yourdomainname, you have no idea how many SSL certificates they bought, and from which CAs.<p>Even if they publish a blog post about it and show you a certificate, surely your domain is now compromised? You can revoke that certificate, but how do you know that was the only one they obtained?<p>From this point on, all you know is that your domain name is potentially compromised and there&#x27;s nothing you can do to fix it...
评论 #9242994 未加载
评论 #9243198 未加载
hackhatabout 10 years ago
Imo the problem is of the issuer. They only opens holes by doing this kind of things. Imagine if you already secured the admin@domain.com and tomorrow the issuer thinks that admin-ssl@domain.com could be used for validation. Now what, you should keep up with their updates every hour?
estabout 10 years ago
The most mind boggling aspect of PKI is that certs for a CN is not globally exclusive.<p>Hell even something as broken as DNS has one and only one place to find each domain&#x27;s authoritative SOA record
bandramiabout 10 years ago
This is why self-signed certificates are more secure than CA-signed certificates. When you expand the trust model to include three parties rather than two, it gets much more complex and vulnerable.<p>If I see a self-signed certificate from CitiBank, I know that the counterparty <i>claims to be CitiBank</i>. That&#x27;s all I know. When I receive a Verisign-signed certificate from CitiBank, I know a party <i>claiming to be Verisign</i> claims that the counterparty is CitiBank. That doesn&#x27;t realistically help me much.
lucioabout 10 years ago
What happens if you try admin@xxx using an unicode homoglyph, i.e, the letter &quot;a&quot; in &quot;admin&quot; being the Cyrillic letter &quot;а&quot;, U+0430 instead of U+0061 ?
评论 #9243434 未加载
mdewinterabout 10 years ago
Do note that you need TLSv1.2 to connect to the website, or plain HTTP.
评论 #9243561 未加载
witty_usernameabout 10 years ago
surely Comodo can check if there is an existing cert?
评论 #9243115 未加载
smt88about 10 years ago
I&#x27;ve never seen a provider of SSL certificates (or any other service) allow you to &quot;prove ownership&quot; of a domain by receiving an email.<p>Even from the early days of email, it has <i>never</i> been the case that a majority of a domain&#x27;s email addresses were assigned to owners of the entity.<p>That is just absolutely insane.
评论 #9242890 未加载
评论 #9242910 未加载
评论 #9242928 未加载
评论 #9242883 未加载