Die Aufregung um #selfsigned Zertifikate in der #ITSecurityIndustrie ist jedes Mal wieder amüsant. Ich persönlich vertraue meiner eigenen #rootCA blind – mehr als jedem undurchsichtigen, kommerziellen #SSL-Anbieter.

So I recently argued with our Security Guy at work, about how important it is to phase out SHA1-signed Root CA certs from our product’s root store.

My argument was like this
* it is a self-signed cert (Root CA, not intermediate)
* the way it becomes trusted is not through the signature
* the actual thing you are trusting is the public key, not the signature
* also, no browser, OS, or Java lib publishers are removing these

His argument was like this
* standards like NIST say don’t trust SHA-1 for anything important
* if we keep them, it’s not a good look for us
* we are currently not using those certs (e.g. Entrust two oldest CA’s) for anything at the moment

I asked him to explain the risk or a specific attack where breaking the signature (not the key) compromises anything, and apparently he “doesn’t have time to explain the basics to me” and I should go google it. Hmm
#sha1 #ssl #rootCA

Bei mir sehe ich in den #Android-Einstellungen von #LineageOS20 in der Sektion "Verschlüsselung & Anmeldedaten" einen ausgegrauten Menupunkt "Zertifikatsverwaltungs-App", den man nicht auswählen kann.

Was für eine App könnte man dafür nutzen? Kann man den Menupunkt irgendwie aktivieren? Oder geht das nur mit MDM?

Ich suche schon länger nach einer App, mit der man Einstellungen für aktivierte/deaktivierte sowie eigene #RootCA-Zertifikate mit root-Rechten sichern und wiederherstellen kann.

Good news: the Chinese #CA https://www.bjca.cn/ (that is currently in the process of joining the #RootCA program in all our web browsers) has confirmed they have strong technical controls that separate their root CA business from their alleged #spyware business.

Bad news: The alleged spyware business, and tge fact these are bother under control of the same business.

This is genuinely fascinating watching a company basically destroy a large part of itself, not so much for what they originally did, but how they reacted when asked about it: https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/etbBho-VBQAJ?pli=1 #cacert #rootca #certificates #trustcor
Die Zertifizierungsstelle #Trustcor steckt in Chrome, Safari und Firefox - dabei hat sie Verbindungen zu Spyware- und Überwachungsfirmen.
#RootCA #Ueberwachung #Browser
https://www.golem.de/news/chrome-safari-firefox-die-mysterioese-firma-die-in-unseren-browsern-steckt-2211-169708.html
Chrome, Safari, Firefox: Die mysteriöse Firma, die in unseren Browsern steckt - Golem.de

Die Zertifizierungsstelle Trustcor steckt in Chrome, Safari und Firefox - dabei hat sie Verbindungen zu Spyware- und Überwachungsfirmen.

Golem.de
Mysterious company with government ties plays key internet role

TrustCor Systems, which vouches for the legitimacy of websites, has connections to contractors for U.S. intelligence agencies and law enforcement, according to security researchers, documents and interviews.

The Washington Post

We have a secretive company with a lot of shady connections and no real office. Ok, there are plenty of them, you say. Yes, but the others don't operate root CAs, the businesses that secure our Internet traffic. 🚩

They also claim to provide end-to-end encrypted mail, but are able to decrypt them. 😱 Reminds me of #Anom

What could possibly go wrong?

#RootCA #CA #TrustCor
https://www.washingtonpost.com/technology/2022/11/08/trustcor-internet-addresses-government-connections/

Mysterious company with government ties plays key internet role

TrustCor Systems, which vouches for the legitimacy of websites, has connections to contractors for U.S. intelligence agencies and law enforcement, according to security researchers, documents and interviews.

The Washington Post

https://scotthelme.co.uk/impending-doom-root-ca-expiring-legacy-clients/

C'est une problématique intéressante à laquelle on prête peu d'attention.

Lorsqu'on parle de machines connectées qui ne sont plus mises à jour, on pense immédiatement aux risques de sécurité que ça implique (plus de correctifs) et une incompatibilité avec de futures versions des logiciels.

1/n

#ca #rootCA #expiry #certificate #letsencrypt

Easy, Secure HTTPS With An ESP8266

Security has always been an issue with IoT devices. Off the shelf devices often have terrible security while DIY solutions can be complicated, needing recompilation every time a website’s fin…

Hackaday