ADDITIONAL Information Security Review, 3b/ November 2011 On vulnerabilities in the certificate system

Size: px
Start display at page:

Download "ADDITIONAL Information Security Review, 3b/2011. 28 November 2011 On vulnerabilities in the certificate system"

Transcription

1 ADDITIONAL Information Security Review, 3b/ November 2011 On vulnerabilities in the certificate system 1

2 CERT-FI Information Security Review 3b/2011 On vulnerabilities in the certificate system This additional CERT-FI information security review focuses on vulnerabilities found in certificate systems and information security incidents affecting certification service providers. The review further specifies and delves deeper into the issues discussed in the information security review 3/2011. Included in this article are recommended measures and practices for end-users, data administration units and application developers, aimed at ensuring their own information security and that of other parties. The certificate system s security has been compromised Several certification service providers issuing server certificates have been subjected to intrusion attempts and successful data breaches over the year. Access rights obtained by the intruders have been used to generate server certificates in the name of third parties such as Google. At the moment, we have no certain knowledge of the intended use of these fraudulently obtained certificates. There has been speculation that certain states intelligence agencies were involved. The presence of technical and process-related vulnerabilities in the certificate system has been demonstrated on prior occasions. Certification service providers have signed certificates without ascertaining the applicant s true identity and position. Checkups of certificate validity and their annulment are unreliable, causing problems when certificate key pairs fall into the hands of outsiders. Operating systems and applications rely on a large number of root certification authorities, which are assumed to be reliable, even though the majority of users never need the certificates signed by these authorities. Experience has shown that not all certification service providers can be considered trustworthy. There are no reliable technical measures for annulling a relationship of trust. The events of the past year have brought these problems to light. Vulnerabilities in the system have been systematically exploited, resulting in the information security of a large number of users being compromised. As currently implemented, the security provided by certificates is insufficient. What is more, no major improvements can be expected without a complete certificate system overhaul. This document details the information security breaches and threats that have become public knowledge and dispenses advice that will help users, IT management and application developers to utilise the security features of the existing certificate system in order to protect their environments. 2

3 ComodoHacker case In 2011, several successful system breakins that targeted certification service providers were perpetrated. The common thread was that the perpetrator attempted to create authentic server certificates. In some cases, the intruder succeeded, while even managing to hide the data breach. The perpetrator and customer remain unknown. A hacker using the alias ComodoHacker has publicly claimed responsibility for the break-ins. The user of this alias states that it is backing the government of Iran against the Arab Spring uprising. Neither the identity nor the nationality of this party is known: it is not even known whether an individual or group is using the alias. The first system break-in to come to light targeted a US root certification authority named Comodo. On 23 March 2011, the company released a statement in which it claimed that the user ID of a person working for a subcontractor had fallen into the hands of an outsider. This user ID was used to create nine server certificates, including ones for the addresses and login.skype.com. The company detected the data breach within hours of the incident and annulled the fraudulently obtained certificates. Since annulment of certificates alone may not be sufficient to prevent misuse, major software companies such as Microsoft and Mozilla brought forward the release of updated versions of their products, preventing the use of unreliable certificates. In mid-june 2011, the Israeli certification authority StartSSL was subjected to an attempted system break-in. Similarly to the other attacks, the attacker attempted to gull the CA into issuing certificates for services owned by other parties. According to StartSSL, this attempt failed. At the end of August, it was revealed that an attack on the Dutch company DigiNotar had resulted in the creation of authenticseeming certificates for all Google services. This sequence of events began on 28 August, when an Iranian user enquired about the Chrome browser s odd behaviour, in an error description submitted to a support forum. It transpired that an Iranian operator named Pars Online was routing traffic to Google servers, through intermediary servers equipped with apparently authentic server certificates issued by DigiNotar. This incident came to light because the Google Chrome browser is programmed to display an alert if a server is signed by a CA other than those predetermined by Google. DigiNotar was not included on the list in question. DigiNotar systems had signed the certificate on 10 July 2011, meaning that the system break-in had occurred at least one and a half months prior to the event. DigiNotar only admitted to the incident s occurrence in the face of public pressure. Later, it became clear that the company had gone so far as to actively attempt to cover up the incident. A security review ordered by the Dutch government revealed that the certification service providers information security had been based on extremely deficient practices. It is still unclear how DigiNotar had been able to deceive system auditors in the past. DigiNotar had been accepted onto a list of CAs trusted by major browser producers, after passing an audit performed by a well-known firm of consultant auditors. Since then, the Dutch government has assumed control of DigiNotar s business operations and cancelled all of its certificates. The USbased company Vasco, which had acquired DigiNotar in January 2011, declared the company bankrupt around a month after the detection of the system break-ins. As in the case of Comodo, the annulment of DigiNotar certificates required action by software producers. There is no procedure for annulling root CAs within the certificate system itself. A suspected data breach concerning GlobalSign CA came to light on 5 3

4 September 2011, when the user of the alias ComodoHacker, the perpetrator of the previous attacks, openly boasted about the matter. Issuance of GlobalSign certificates was momentarily suspended. Investigations revealed that only the company Web servers had been hacked. On 13 September 2011, issuance of certificates was resumed after a few days investigation. Older cases Vulnerabilities in certificate system processes have also been exploited for identity fraud purposes in older cases. For instance, in 2008, an information security specialist was able to obtain Live.com certificates from Thawte. More recent cases Two new information security problems concerning certification service providers have become public knowledge since the ComodoHacker case. On 3 November 2011, it was revealed that an Entrust subcontractor named DigiCert Malaysia had issued 22 certificates utilising 512-bit keys, which are considered insecure. These certificates did not include information on the certificate annulment service or their purpose of use. However, there is no evidence that these certificates were used for fraudulent activities, or that they were obtained through fraudulent means. DigiCert Malaysia certificates have been deleted from browser root certificate lists. The fact that browser root certificate lists include a major, similarly named certificate seller based in the US has only added to the confusion. Measures prompted by these cases In the cases of Comodo and DigiNotar, the majority of major browser and OS producers quickly released updates eliminating the newly distrusted root certificates. Their actions were somewhat more rapid in the case of DigiNotar than in the Comodo case. Updates were made available two to eight days after the detection of the system break-ins. Although no actual mechanisms exist for annulling root certificates, the situation can be rectified by releasing software updates that eliminate distrusted certificates. However, software updates may entail significant delays with regard to both the release of updates and their installation in systems. In practice, the attacker has the potential to continue exploiting any fraudulent certificates it has obtained for a long time afterwards. Even before the Comodo case, the information security community was generally aware of the risks inherent in the certificate system. However, there have been no practical alternatives to the system. As in the case of many other technologies, X.509 certificates and the SSL/TLS (Secure Sockets Layer, later termed Transport Layer Security) protocols are used much more extensively than was imagined when the standards were drafted. These protocols have been adopted for many entirely new applications; in the design stage, insufficient account was taken of threats that are now viewed as significant. The KPN operator s certificate service temporarily suspended certificate sales on 4 November 2011, when a DoS attack tool was found on the company s Web server during an audit. This data breach may have occurred as long as four years prior to its detection. According to current knowledge, the actual certificate systems were not compromised. 4

5 How certificates are used Users can use certificates to ascertain that an online service provider is who it claims to be. Certificates are also used for verifying the authenticity of software and identifying users. As such, they are issued by trusted certification authorities (CA). In most cases, certificates are formed into a hierarchy, in which the top-level root certificate is used for signing the certificates of sub-cas that, in turn, sign the certificates issued. The branches of the certificate tree are separate, and annulling one branch (i.e. sub-ca) and the certificates under it does not affect other branches. Website certificates include information such as the certified website s domain name, various information on the party to whom the certificate has been issued, the certificate s CA-specific serial number, period of validity, information on the CA s Certificate Revocation List (CRL) and the location of the certificate status check-up service (Online Certificate Status Protocol, OCSP), the certificate issuer, the public key, and the certificate s purposes of use. In addition to specific domain names, the object of a certificate may be a domain name sub-network, address or software developer. A list of trusted root CAs is integrated into operating systems and, in some cases, browsers. Browsers treat website-specific certificates issued by these parties as trustworthy.. Certificates are used, for instance, in encrypted SSL/TLS data communication connections (HTTPS). If a website s certificate is not signed by a CA included on the list of trusted root CAs or by a certificate signed with such a CA, browsers alert users to this fact. What made the attacks possible? Every root certificate is suitable for use as the signatory of all websites; root certificates do not have a hierarchy. Even if the service provider has obtained the certificate from a certain CA, a certificate issued by any other trusted CA is considered the equivalent of the real certificate. The information security of the 5 most vulnerable CA is the deciding factor. Changes in certificates presented by a certain website are not generally monitored in browsers or in a centralised manner. The DigiNotar case was only detected due to a feature of the Google Chrome browser based on which only certain CAs are accepted as issuers of certificates for Google s own websites. Cases in which the top level of the hierarchy, i.e. the root CA, becomes unreliable have not been taken into account in the design of the hierarchy. For instance, the certificate revocation list functionality can only be used for annulling certificates issued by the root CA. In practice, registration authorities (RA) and certificate retailers and subcontractors participate in the issue of domain names alongside CAs, complicating the situation. No restrictions concerning which certificates CAs and subcontractors may release are in use, even though this would be possible based on the specifications. For instance, the unauthorised certificates related to the Comodo case, mentioned in the introduction, were released by a subcontractor. The objectives of the attackers Falsified certificates can be used to carry out a man-in-the-middle (MITM) attack, hijacking the connection between a service and its user. Falsified certificates can also be used for eg. phishing, by using a website created by the attacker to steal information, such as user IDs and passwords. An attack on Web service users can also be carried out by falsifying name service data, if part of the website in question is downloaded from a thirdparty website. Most websites download data of this kind as advertisements and user statistics services, such as the Google Analytics service ( from third parties. In order to carry out a MitM attack, the network infrastructure or name server must be under the control of the attacker, or the attacker must be in the same local area network as the victim. Open WLAN

6 networks, for instance, offer many opportunities for carrying out MitM attacks. In both the Comodo and DigiNotar cases, there has been speculation that the issued certificates were used for monitoring the of Iranian users. Challenges related to certificate systems Browsers root certificate stores currently include outdated root certificates, which use short keys and unsafe algorithms, and certificates with extremely long validity periods. Root certificates and High Security Modules (HSM), including CAs secret keys, that have been included on a list of trusted certificates are in commercial demand among CAs, since inclusion on these lists is difficult. Browser and OS producers have defined specific requirements for those CAs that wish to be included on the root CA lists. In accordance with these requirements, the security of systems used for creating certificates must be ensured through audits, for instance. However, this was ineffective in the case of DigiNotar. According to reports published in connection with the investigation of the system break-in, the company s security measures were clearly insufficient, even though the company had passed the auditing process. Most certificates used by websites are signed by around 20 CAs. The number of root certificates included in browsers and operating systems is many times that number. For instance, clearly local CAs, which the majority of users will likely never need, are included. So-called Extended Validation (EV) certificates have never achieved much popularity. According to CAs, EV certificates are especially secure, since the certificate applicant s entitlement to the certificate is ascertained with particular care in connection with issuance. However, users are largely unaware of the difference between EV and regular certificates. Exclusion of non-ev certificates is impossible in applications, and would make little sense with regard to the market situation. In practice, it 6 constitutes no more than a marketing method for more expensive certificates. DigiNotar and Comodo were also selling EV certificates. Thus, selling EV certificates does not guarantee that a particular CA s information security is in order. Understanding the use of X.509 certificates requires familiarisation with the technology, even in the case of experts. With regard to applications with a mass user base, such as browsers, clear implementation errors have been made concerning certificate handling. It has been necessary to repeat these errors in new applications and certificates, in order to ensure backward compatibility. In addition, certificates are stored in browser caches in order to speed up use of applications this may extend the use of annulled certificates. Recommendations for IT management departments Evaluate the root certificates required by users in your organisation. Do not include blindly all certificates enclosed with the OS and browsers. Only add the necessary certificates to systems requiring special protection. Send users certificate information on websites requiring special protection when the certificates change. Identify any insecure algorithms whose deletion from the list of accepted algorithms has been recommended. When obtaining certificates, assess the credibility of the CA. Purchasing the most inexpensive certificate may result in additional future expenditure. Significant costs are involved in reliably maintaining the information security of your own certificate system. Do not use certificates whose CA is not included among those trusted

7 in users systems. Renew certificates before their expiry. In this way, you will avoid habituating your users to disregarding messages on certificate errors. Give thought in advance to what action you will take, if the issuer of the certificates used on your websites is subject to a data breach and its root certificate is annulled. Recommendations for users Activate your browser s advanced security features. Do not disregard error notifications on certificates, without identifying the reason for the notification. Keep your operating system and browser up-to-date. Be alert and take note if you are redirected to an insecure website, for instance. Recommendations for application developers Applications should not function in such a manner that, in the event of a certificate verification failure, they continue as before without consulting the user. Familiarise yourself with the operating principles of certificates before creating your application. Ensure that certificate chains are verified up to the root CA. Pay special attention to checking the Basic Constraints extension in all certificates within the chain. Implement certificate revocation list functionalities. Strive for a good balance between information security and the certificate error notifications displayed to users. Pay special attention to ensuring that browser UIs present users with error statuses and observations related to certificates 7 in a clear manner. Try to prevent the possibility to deceive users due to browser vulnerabilities. In the case of many devices, users cannot modify the list of trusted root certificates. Knowledgeable users are not provided with the means to improve their information security. With regard to update mechanisms, the option of determining accepted CAs within the application should be considered. The purposes of use indicated on certificates must be observed. Development outlook Users trust the assessments of application producers and operating systems, as to whether certification service providers are safe. The deletion process for root certificates that are no longer trusted must be accelerated. It is advisable that browsers use the operating system s central certificate directory, in which event the user will only need to perform a single update. Users should be provided with tools enabling them to easily browse, compare and edit the root certificate list of the various applications and OS. Trust forms the basis of the entire certificate system. Thus, it is of paramount importance that CAs act responsibly in the event of a suspected data breach, while also actively providing information on attacks and their impact. This would ultimately reduce the financial losses suffered by companies. Comodo, which acted responsibly, has continued operating, whereas DigiNotar was declared bankrupt. An obligation to notify customers of data breaches would provide an incentive for improving security. An increase in the number of self-signed certificates would result in users becoming blasé about notifications of certificate errors. Large companies may have the resources to create their own certificates in a secure manner, while also ensuring that the organisation s root certificates

8 are added to the list of trusted CAs. Smaller actors seldom have the resources or expertise required to implement a certificate system taking sufficient account of information security issues. In the future, certificates will also be used more frequently for verifying the credibility of executable applications. In addition to the Vista and Windows 7 operating systems, verification is used in all smart phone platforms. This means that software producers must also focus on the information security of certificates used for signing applications. Signed malware has already been used in numerous attacks, including the widelypublicised Stuxnet case. Components searching systems for certificates and the related encryption keys have been found in data-stealing malware. There have also been cases of malware inserting malicious code into the existing programme code in developer systems. New information security features related to certificates will be introduced to browsers at least in the form of addons. Google has introduced new information security features related to certificates, for instance in its Chrome browser. This is putting pressure on other browser producers to do the same. SSL/TLS-encrypted websites are used increasingly with mobile devices. Updating mobile devices is much more cumbersome for the user than updating a computer. In addition, updates are not made available quickly enough. The most-frequently used SSL/TLS protocol version is TLS 1.0. Over recent years, there has been some speculation regarding its level of information security. Even secure certificates are unable to protect an insecure transfer protocol. Implementation of later versions of TLS will become unavoidable at some point, but implementing encryption libraries that support these new versions will require investments from both server and customer software makers. In response to certificate system problems, developers have presented various new information security solutions. Some of these do not yet have established names. More than one of these solutions is likely to be taken into use, since they do not protect users from the same threats. It is to be hoped that these solutions require no great expertise from users; rather, they should also protect so-called ordinary users. The risk here is that the solutions only add to the complexity of an already complex certificate system. Solutions based on name server data: DNS Certification Authority Authorization (CAA) name service record: adding root certificate IDs that may issue certificates to the web site to DNS data. Inclusion of the DNSSEC chain in the website certificate. DNS TLSA name service record: inclusion of the correct certificate ID for the website in the DNS data. Being based on name server data, the two latter solutions require the implementation of the DNS name service security extension DNSSEC. Close integration with DNSSEC certificates alone is not altogether unproblematic, since the power to decide which are trusted CAs is transferred from the service administrator and users to the issuer of domain names. Service-end solutions: HTTP Strict Transport Security (HSTS): a procedure in which a web service may inform the browser that only encrypted traffic to the website should be allowed. OCSP Pinning or Certificate Status Request: a procedure in which a web service checks the status of its own certificate, then returns it to the browser as part of the reply. Application-end solutions: Certificate pinning or domain pinning: only accepting certain CAs as the issuers of the certificate of a service. 8

9 Localization of root certificate lists: root certificate lists only include the most common root certificates frequently used in the area in question. Centralised solutions: Convergence: a technology developed by the SSL/TLS researcher Moxie Marlinspike, in which trusted parties, i.e. so-called notaries are queried about the reliability of certificates. Notaries can be freely established: system users decide which notaries they will trust. Meta CA: a meta CA, replacing the browser and OS producers root certificate lists, in which browser and OS producers could trust. Centralised certificate directory: certificate directories, implemented using various technologies, to which the certificate used by a web service could be compared. Google, Tor and EFF SSL Observatory, for instance. The functionalities of the different scenarios are compared in table 1. Situations in which the user terminal is infected with malware have been excluded from the scenarios. Other situations, in which the attacker can insert its own content into the SSL connection, through means such as the website s XSS vulnerability or web service hacking, have also been excluded. 9

10 Table 1. Protection provided by the existing and proposed security features in various situations. Technology Deceiving the CA by means of false information First-time visit to an HTTPSprotected website Second visit to a HTTPSprotected website Dowgrading HTTPS to HTTP Other man-inthemiddle attacks SSLencrypt ed phishin g website 1) Disclosure of certificate key pair to a third party Break-in to CA systems Malicious CA Notes Certificate Revocation Lists (CRL) No Yes Yes No No No Yes No No OSCP No Yes Yes No No No Yes No No EV certificates Yes No No No No No No No No DNS CAA RR a) Yes No No No No No No No No HSTS OSCP Pinning DNS TLSA RR a) No 2) DNSSEC chain in certificate a) Certificate pinning No No No Yes No No No No No Only implemented at this time in the Firefox browser No Yes Yes No Yes No Yes No No Re-use of replies is possible. Yes Yes No Yes Yes No 2) No 2) No 2) Some security guarantees will be transferred to DNSSEC. No 2) Yes Yes No Yes Yes No 2) No 2) No 2) Some security guarantees will be transferred to DNSSEC. No Yes Yes No Yes Yes No Yes No Non-scalable, used in browsers Windows Update, Google websites. Convergence No Yes Yes No Yes Yes No No Yes Meta CA a) longer need to maintain No Yes Yes No No Yes No Yes No Browser producers no lists. Centralised certificate directory No Yes Yes No Yes Yes No Yes Yes a) Not yet in use. 1) The website is trying to mislead the user by using an address that resembles the genuine website s address. 2) However, DNSSEC may help. 10

11 Information on the cases DigiNotar: 30 August September September September 2011 Comodo: 24 March 2011 Other documents related to the matter CA information security requirements: Mozilla: Microsoft: Apple: Opera: Cabforum s 'Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates' document: The Dutch authorities have released information on the DigiNotar case: The Austrian CERT has drafted an assessment of the impact of the DigiNotar case in Austria: ic.pdf atsaus-drafti?action=edit&editor=text Jarno Niemelä s presentation on the misuse of software signatures: 11

Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs

Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs OWASP AppSec APAC 2012 The OWASP Foundation http://www.owasp.org Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs

More information

Attacks against certification service providers and their ramifications

Attacks against certification service providers and their ramifications Federal IT Steering Unit FITSU Federal Intelligence Service FIS Reporting and Analysis Centre for Information Assurance MELANI www.melani.admin.ch Technological consideration Attacks against certification

More information

SSL/TLS: The Ugly Truth

SSL/TLS: The Ugly Truth SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team adrian.hayter@cnsuk.co.uk Contents Introduction to SSL/TLS Cryptography

More information

SSL and Browsers: The Pillars of Broken Security

SSL and Browsers: The Pillars of Broken Security SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the

More information

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB Scott Rea DigiCert, Inc. Session ID: SEC-T02 Session Classification: Intermediate BACKGROUND: WHAT IS A CERTIFICATION AUTHORITY? What is a certification

More information

Securing End-to-End Internet communications using DANE protocol

Securing End-to-End Internet communications using DANE protocol Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive

More information

Websense Content Gateway HTTPS Configuration

Websense Content Gateway HTTPS Configuration Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco

More information

Lesson 10: Attacks to the SSL Protocol

Lesson 10: Attacks to the SSL Protocol Lesson 10: Attacks to the SSL Protocol Luciano Bello - luciano@debian.org Chalmers University Dr. Alfonso Muñoz - amunoz@diatel.upm.es T>SIC Group. Universidad Politécnica de Madrid Security of the SSL

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

NIST ITL July 2012 CA Compromise

NIST ITL July 2012 CA Compromise NIST ITL July 2012 CA Compromise Prepared for: Intelligent People paul.turner@venafi.com 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These

More information

Should You Trust the Padlock? Web Security and the HTTPS Value Chain. Keeping Current 20 November 2013 Ken Calvert

Should You Trust the Padlock? Web Security and the HTTPS Value Chain. Keeping Current 20 November 2013 Ken Calvert Should You Trust the Padlock? Web Security and the HTTPS Value Chain Keeping Current 20 November 2013 Ken Calvert Outline 1. What are we afraid of? 2. Countermeasures: Securing the Web 3. Public-key Crypto

More information

Microsoft Trusted Root Certificate: Program Requirements

Microsoft Trusted Root Certificate: Program Requirements Microsoft Trusted Root Certificate: Program Requirements 1. Introduction The Microsoft Root Certificate Program supports the distribution of root certificates, enabling customers to trust Windows products.

More information

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure

More information

Extended Validation SSL Certificates

Extended Validation SSL Certificates Extended Validation SSL Certificates A NEW STANDARD TO INSPIRE TRUST, improve confidence and increase sales... INDEX 1. Extended Validation (EV) SSL Certificates solving a trust problem 2. Traditional

More information

A Proper Foundation: Extended Validation SSL

A Proper Foundation: Extended Validation SSL A Proper Foundation: Extended Validation SSL A critical model for SSL digital certificates and browser trust Get this White Paper Entrust, Inc. All Rights Reserved. 1 1 Contents Context of Internet Security...

More information

White paper. How to choose a Certificate Authority for safer web security

White paper. How to choose a Certificate Authority for safer web security White paper How to choose a Certificate Authority for safer web security Executive summary Trust is the cornerstone of the web. Without it, no website or online service can succeed in the competitive online

More information

Annual Review 2011 31 January 2012 1

Annual Review 2011 31 January 2012 1 Annual Review 2011 31 January 2012 1 CERT-FI review 2011 Abstract annual The year 2011 was characterised by many information security breaches getting a lot of public attention. The information obtained

More information

Extended SSL Certificates

Extended SSL Certificates Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is

More information

Bugzilla ID: Bugzilla Summary:

Bugzilla ID: Bugzilla Summary: Bugzilla ID: Bugzilla Summary: CAs wishing to have their certificates included in Mozilla products must 1) Comply with the requirements of the Mozilla CA certificate policy (http://www.mozilla.org/projects/security/certs/policy/)

More information

SSL BEST PRACTICES OVERVIEW

SSL BEST PRACTICES OVERVIEW SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

Is Your SSL Website and Mobile App Really Secure?

Is Your SSL Website and Mobile App Really Secure? Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

INFORMATION SECURITY REVIEW

INFORMATION SECURITY REVIEW INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,

More information

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu udio/video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Gain a New Level of Trust with Extended Validation SSL Certificates

Gain a New Level of Trust with Extended Validation SSL Certificates Gain a New Level of Trust with Extended Validation SSL Certificates Higher Standard for SSL Certificates Malicious Internet activities such as phishing and pharming have victimized millions of people.

More information

Certificates, Revocation and the new gtld's Oh My!

Certificates, Revocation and the new gtld's Oh My! Certificates, Revocation and the new gtld's Oh My! Dan Timpson sales@digicert.com www.digicert.com +1 (801) 877-2100 Focus What is a Certificate Authority? Current situation with gtld's and internal names

More information

A Proper Foundation: Extended Validation SSL

A Proper Foundation: Extended Validation SSL A Proper Foundation: Extended Validation SSL A critical model for SSL digital certificates and browser trust Get this White Paper Entrust, Inc. All Rights Reserved. 1 1 Contents Context of Internet Security...

More information

Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.

Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1. Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response

More information

Installation and usage of SSL certificates: Your guide to getting it right

Installation and usage of SSL certificates: Your guide to getting it right Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.

More information

Prioritizing Trust: Certificate Authority Best Practices

Prioritizing Trust: Certificate Authority Best Practices WHITE PAPER: PRIORITIZING TRUST: CERTIFICATE AUTHORITY BEST PRACTICES White Paper Prioritizing Trust: Certificate Authority Best Practices A Policy for Commercial Certificate Authorities Prioritizing Trust:

More information

CSC574 - Computer and Network Security Module: Public Key Infrastructure

CSC574 - Computer and Network Security Module: Public Key Infrastructure CSC574 - Computer and Network Security Module: Public Key Infrastructure Prof. William Enck Spring 2013 1 Meeting Someone New Anywhere in the Internet 2 What is a certificate? A certificate makes an association

More information

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

Introduction to Network Security Key Management and Distribution

Introduction to Network Security Key Management and Distribution Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology cetinkayae@mst.edu http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015

More information

Guidelines for Web applications protection with dedicated Web Application Firewall

Guidelines for Web applications protection with dedicated Web Application Firewall Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security

More information

GeoTrust Extended Validation SSL and Customer Confidence

GeoTrust Extended Validation SSL and Customer Confidence GeoTrust Extended Validation SSL and Customer Confidence Introduction Suspicion, doubt, reluctance, abandonment, and in some cases refusal to shop online at all anymore are growing characteristics among

More information

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Alternatives and Enhancements to CAs for a Secure Web

Alternatives and Enhancements to CAs for a Secure Web Alternatives and Enhancements to CAs for a Secure Web Ben Wilson Digicert, Inc. - CA/Browser Forum Eran Messeri Google Session Classification: Intermediate Current Web PKI System OS / Browsers have Managed

More information

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of

More information

By Jan De Clercq. Understanding. and Leveraging SSL-TLS. for Secure Communications

By Jan De Clercq. Understanding. and Leveraging SSL-TLS. for Secure Communications By Jan De Clercq Understanding and Leveraging SSL-TLS for Secure Communications ii Contents Chapter 2: Leveraging SSL/TLS for Secure Web Communications....... 21 Setting Up SSL/TLS on a Web Server..................................

More information

Server Certificates based on DNSSEC

Server Certificates based on DNSSEC Server Certificates based on DNSSEC Audun Jøsang and Kashif Sana Dar University of Oslo josang@mn.uio.no and kashifd@ifi.uio.no Abstract. Globally unique domain names and IP addresses that are provided

More information

SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust

SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust SSL Interception Proxies Jeff Jarmoc Sr. Security Researcher Dell SecureWorks and Transitive Trust About this talk History & brief overview of SSL/TLS Interception proxies How and Why Risks introduced

More information

IPv4 Shortage Multiple SSL Certificates on a single IP address

IPv4 Shortage Multiple SSL Certificates on a single IP address GlobalSign. A GMO Internet Inc group company. IPv4 Shortage Multiple SSL Certificates on a single IP address Paul van Brouwershaven EMEA Business Development Director GLOBALSIGN SOLUTIONS Visible Trust

More information

Internet Trust Next Generation Part 1: Requirements

Internet Trust Next Generation Part 1: Requirements Internet Trust Next Generation Part 1: Requirements Phillip Hallam-Baker Comodo Inc The Internet Trust Infrastructure The deployed Internet Trust Infrastructure is based on the IETF PKIX standards which

More information

The Impact of Extended Validation (EV) Certificates on Customer Confidence

The Impact of Extended Validation (EV) Certificates on Customer Confidence WHITE PAPER: The Impact of Extended Validation (EV) Certificates on Customer Confidence YOUR SUCCESS IS BUILT ON TRUST 1 THE IMPACT OF EXTENDED VALIDATION (EV) CERTIFICATES ON CUSTOMER CONFIDENCE As ecommerce

More information

RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0

RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Forum RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying and distribution

More information

Mobile Security Threats: Get Ready for 2016

Mobile Security Threats: Get Ready for 2016 GUIDE Mobile Security Threats: Get Ready for 2016 As enterprise-grade data analytics, predictive intelligence and cognitive computing grow, security is on the forefront of everyone s mind. Hacks have become

More information

ARPKI: Attack Resilient Public-Key Infrastructure

ARPKI: Attack Resilient Public-Key Infrastructure ARPKI: Attack Resilient Public-Key Infrastructure David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski ETH Zurich, University of Oxford, CMU 1 PUBLIC KEYS AND CERTIFICATES

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

PKI : state of the art and future trends

PKI : state of the art and future trends PKI : state of the art and future trends David Chadwick d.w.chadwick@truetrust.co.uk 25 Sept 2013 2010-13 TrueTrust Ltd 1 Contents Review of X.509 state of the art to date What is new in X.509 (2016) What

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0 Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Digital Certificates July 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark

More information

Basics of SSL Certification

Basics of SSL Certification Introduction To secure transmission of information from browser to a web server, a security protocol is used. SSL (Secure Socket Lock) is one of the most popular and widely accepted security protocols,

More information

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th November 2014 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously

More information

Analyzing DANE's Response to Known DNSsec Vulnerabilities

Analyzing DANE's Response to Known DNSsec Vulnerabilities Analyzing DANE's Response to Known DNSsec Vulnerabilities Matthew Henry Joseph Kirik Emily Scheerer UMBC UMBC UMBC henmatt1@umbc.edu joskir1@umbc.edu semily1@umbc.edu May 9, 2014 Abstract: SSL/TLS is currently

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

Specific recommendations

Specific recommendations Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It

More information

Authentication Application

Authentication Application Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be

More information

TELSTRA RSS CA Subscriber Agreement (SA)

TELSTRA RSS CA Subscriber Agreement (SA) TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this

More information

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things. Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?

More information

The weakest link in the chain:

The weakest link in the chain: : Vulnerabilities in the SSL certificate authority system and what should be done about them An Access Policy Brief Regarding the Consequences of the DigiNotar breach for Civil Society and Commercial Enterprise

More information

The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is.

The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is. Trustwave Subscriber Agreement for Digital Certificates Ver. 11JUL14 PLEASE READ THIS AGREEMENT AND THE TRUSTWAVE CERTIFICATION PRACTICES STATEMENTS ( CPS ) CAREFULLY BEFORE USING THE CERTIFICATE ISSUED

More information

Public Key Infrastructures

Public Key Infrastructures Public Key Infrastructures Ralph Holz Network Architectures and Services Technische Universität München November 2014 Ralph Holz: Public Key Infrastructures 1 Part 2: Recent results or: the sorry state

More information

StartCom Certification Authority

StartCom Certification Authority StartCom Certification Authority Intermediate Certification Authority Policy Appendix Version: 1.5 Status: Final Updated: 05/04/11 Copyright: Start Commercial (StartCom) Ltd. Author: Eddy Nigg Introduction

More information

BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options

BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you

More information

Protecting Your Name on the Internet The Business Benefits of Extended Validation SSL Certificates

Protecting Your Name on the Internet The Business Benefits of Extended Validation SSL Certificates Protecting Your Name on the Internet The Business Benefits of Extended Validation SSL Certificates 2008 Copyright Godaddy. All rights Reserved Page 1 Contents 1. Where We Are Now...3 2. How SSL Certificates

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

understanding SSL certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES

understanding SSL certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES understanding SSL certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES contents UNDERSTANDING SSL CERTIFICATES...1 What Is SSL and What Are SSL Certificates?...1 Features of SSL...1 Encryption...1

More information

A Real-Life Man-in-the-Middle Attack on SSL

A Real-Life Man-in-the-Middle Attack on SSL A Real-Life Man-in-the-Middle Attack on SSL Ted Shorter, Certified Security Solutions February 15, 2005 4:30pm Agenda Spyware product Analysis Work originated while helping CSS client Ways to address the

More information

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain

More information

Understanding SSL Certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES

Understanding SSL Certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES Understanding SSL Certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES Understanding SSL Certificates 2 Secure Socket Layer (SSL) certificates are widely used to help secure and authenticate

More information

Authentication Applications

Authentication Applications Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

A Study of What Really Breaks SSL HITB Amsterdam 2011

A Study of What Really Breaks SSL HITB Amsterdam 2011 A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

What is the point of encryption if you don t know who for?

What is the point of encryption if you don t know who for? 1 What is the point of encryption if you don t know who for? Dr. Colin Walter Head of Cryptography - Comodo Inc. Chairman of Peripherals Working Group Trusted Computing Group. Co-chair - Cryptographic

More information

Web Presence Security

Web Presence Security Web Presence Security Web Presence Security 2 Getting your business online is about reaching out and connecting with millions of potential customers, buyers, and partners. Building a website is the most

More information

How to complete the Secure Internet Site Declaration (SISD) form

How to complete the Secure Internet Site Declaration (SISD) form 1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,

More information

SSL Overview for Resellers

SSL Overview for Resellers Web Security Enterprise Security Identity Verification Services Signing Services SSL Overview for Resellers What We ll Cover Understanding SSL SSL Handshake 101 Market Opportunity for SSL Obtaining an

More information

ENTRUST CLOUD. SSL Digital Certificates, Discovery & Management +1-888-690-2424. entrust@entrust.com entrust.com

ENTRUST CLOUD. SSL Digital Certificates, Discovery & Management +1-888-690-2424. entrust@entrust.com entrust.com ENTRUST CLOUD SSL Digital Certificates, Discovery & Management +1-888-690-2424 entrust@entrust.com entrust.com Entrust Cloud SSL Digital Certificates, Discovery & Management Digital certificates have emerged

More information

Looking Behind the Attacks - Top 3 Attack Vectors to Understand in 2015

Looking Behind the Attacks - Top 3 Attack Vectors to Understand in 2015 WHITEPAPER Looking Behind the Attacks - Top 3 Attack Vectors to Understand in 2015 Malcolm Orekoya Network & Security Specialist 30 th January 2015 Table of Contents Introduction... 2 Identity Defines

More information

Certification Practice Statement

Certification Practice Statement Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require

More information

Search for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements

Search for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements 1 Search for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements Alexandra C. Grant Senior Honors Thesis Advisor: Charles C. Palmer Dartmouth Computer Science Technical Report

More information

Ford Motor Company CA Certification Practice Statement

Ford Motor Company CA Certification Practice Statement Certification Practice Statement Date: February 21, 2008 Version: 1.0.1 Table of Contents Document History... 1 Acknowledgments... 1 1. Introduction... 2 1.1 Overview... 3 1.2 Ford Motor Company Certificate

More information

Breaking the Myths of Extended Validation SSL Certificates

Breaking the Myths of Extended Validation SSL Certificates BlackHat Briefings, 2009 Breaking the Myths of Extended Validation SSL Certificates Alexander Sotirov phmsecurity.com Mike Zusman intrepidusgroup.com Introduction Chosen-prefix MD5 collisions allowed us

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6 WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications

More information

An Overview of the Secure Sockets Layer (SSL)

An Overview of the Secure Sockets Layer (SSL) Chapter 9: SSL and Certificate Services Page 1 of 9 Chapter 9: SSL and Certificate Services The most widespread concern with the Internet is not the limited amount of bandwidth or the occasional objectionable

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

Computer and Network Security. Outline

Computer and Network Security. Outline Computer and Network Security Lecture 10 Certificates and Revocation Outline Key Distribution Certification Authorities Certificate revocation 1 Key Distribution K A, K B E KA ( K AB, E KB (KAB) ) K A

More information

This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network.

This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network. This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network. Prerequisites for Network Registration: 1. In order to

More information

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information