A Real-Life Man-in-the-Middle Attack on SSL



Similar documents
WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

HOB WebSecureProxy as an SSL Terminal for Clients

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Sophos Mobile Control Installation prerequisites form

Configuring SSL Termination

Information Security Threat Trends

Cisco Application Control Engine Appliance

ERserver. iseries. Securing applications with SSL

BEA Weblogic Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

Deployment Guide Microsoft IIS 7.0

SSL SSL VPN

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

Dragonframe License Manager User Guide Version 1.2.2

Generating a Certificate Signing Request (CSR) from LoadMaster

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013

Secure Web Service - Hybrid. Policy Server Setup. Release Manual Version 1.01

Certificate technology on Pulse Secure Access

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Deployment Guide Oracle Siebel CRM

Installation Procedure SSL Certificates in IIS 7

Certificate technology on Junos Pulse Secure Access

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

Enable SSL in Go2Group SOAP Server

Deployment Guide AX Series with Citrix XenApp 6.5

Configuring Secure Socket Layer (SSL)

Pearl Echo Installation Checklist

Steelcape Product Overview and Functional Description

Configuring Digital Certificates

Network Automation 9.22 Features: RIM and PKI Authentication July 31, 2013

Integrated SSL Scanning

Implementing Secure Sockets Layer on iseries

How To Configure SSL VPN in Cyberoam

How to configure SSL proxying in Zorp 3 F5

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

UBS KeyLink Quick reference WEB Installation Guide

SSL VPN Server Guide. Access Manager 4.0. November 2013

Using Entrust certificates with VPN

PortWise Access Management Suite

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

CHAPTER 7 SSL CONFIGURATION AND TESTING

Enterprise Content Management System Monitor 5.1 Security Considerations Revision CENIT AG Brandner, Marc

Superior protection from Internet threats and control over unsafe web usage

By default, STRM provides an untrusted SSL certificate. You can replace the untrusted SSL certificate with a self-signed or trusted certificate.

Sophos Mobile Control Installation guide. Product version: 3.5

CS255 Programming Project 2

Security IIS Service Lesson 6

Deployment Guide MobileIron Sentry

IINS Implementing Cisco Network Security 3.0 (IINS)

Microsoft Labs Online

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods:

Cyclope Internet Filtering Proxy. - Installation Guide -

Implementing Cisco IOS Network Security

MyAccess installation guide for non-myplace clients

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices

Cisco Application Networking for IBM WebSphere

Topics in Network Security

Network Security - ISA 656 Review

Cisco Application Networking for BEA WebLogic

F5 BIG-IP: Configuring v11 Access Policy Manager APM

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

Cyber Security Workshop Ethical Web Hacking

App Orchestration 2.0

Secure Access Using VPN

Version Highlights. CertainT 100 SSL Accelerator. Version International. New hardware and software version. North America

KMIP installation Guide. DataSecure and KeySecure Version SafeNet, Inc

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Windows Remote Access

Sun Java System Web Server 6.1 Using Self-Signed OpenSSL Certificate. Brent Wagner, Seeds of Genius October 2007

IBM Managed Security Services (Cloud Computing) hosted and Web security - express managed Web security

ISM/ISC Middleware Module

Websense Content Gateway HTTPS Configuration

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Veeam Cloud Connect. Version 8.0. Administrator Guide

Deployment Guide May-2015 rev. a. APV Oracle PeopleSoft Enterprise 9 Deployment Guide

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview

MY HELPDESK - END-USER CONSOLE...

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

Unisys Internet Remote Support

THE OPEN UNIVERSITY OF TANZANIA

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Web Security. Mahalingam Ramkumar

Campus VPN. Version 1.0 September 22, 2008

Clearswift Information Governance

PaperCut Payment Gateway Module - RBS WorldPay Quick Start Guide

WebEx Remote Access White Paper. The CBORD Group, Inc.

FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

C-Series How to configure SSL

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

Application Delivery Controller (ADC) Implementation Load Balancing Microsoft SharePoint Servers Solution Guide

Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365


To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:

Apache Security with SSL Using Ubuntu

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

Transcription:

A Real-Life Man-in-the-Middle Attack on SSL Ted Shorter, Certified Security Solutions February 15, 2005 4:30pm

Agenda Spyware product Analysis Work originated while helping CSS client Ways to address the threat: End-user Clients Enterprise-level From the Web Server How to Prevent the General Technique Lessons Learned

The Threat Free Internet Accelerator Service Client Software Installation Included silently with certain free software Installed separately by request Routes client Web traffic through an Internet Web proxy Web proxy performs the following functions: Caches / Compresses web pages Monitors user activity

The Threat Free Internet Accelerator Service Company sells marketing data to 3rd parties Monitoring is mentioned in license agreement Web proxy can read and analyze SSL-protected data

How? Re-direction is at the socket level, not the browser No proxy settings appear in browser configuration Client software determines what gets routed to proxy based on: TCP port number (80, 443) Program name (e.g. IEXPLORE.EXE, NETSCAPE.EXE, etc) Proxy installation places a new self-signed root certificate in the client trusted root store Silently (via C interface)

SSL: Host Certificate Only 1 2 ` 3 Client SSL-enabled Web Server 1. Client s browser loads an SSL-protected web page; requests SSL session from server. (SSL Client Hello ) 2. Server responds with its SSL certificate. (SSL Server Hello ) 3. Client browser checks the validity of the certificate; if OK, client exchanges a session key with server and completes the connection

SSL Man-in-the-Middle Internet Accelerator Proxy 2 1 4 ` 5 3 Client SSL-enabled Web Server 1. Client s browser loads an SSL-protected web page; requests SSL session from server 2. Request is routed to Internet Accelerator, which makes its own request of the server 3. Server responds with its SSL certificate 4. Internet Accelerator parses the relevant information from the server certificate, and creates its own look-alike 5. Internet Accelerator signs the look-alike certificate with its own key, and sends it to the client

Certificate Parsing and Issuance Original Proxied

Certificate Chains: Is Checking the Issuer Name Enough? Root Certificate Issuer: Thawte Subject: Thawte (Placed in Trusted Root Store during Windows Install) Root Certificate Issuer: XYZ Co. Subject: XYZ Co. (Placed in Trusted Root Store during accelerator Install) Root Certificate Issuer: XYZ Co. Subject: XYZ Co. (Placed in Trusted Root Store during accelerator Install) CSS SSL Certificate Issuer: Thawte Subject: CSS Fake CSS SSL Certificate Issuer: XYZ Co. Subject: CSS Fake Issuer Certificate Issuer: XYZ Co. Subject: Thawte Real Certificate Chain Proxied Certificate Chain Proxied Certificate Chain w/forged Issuer Fake CSS SSL Certificate Issuer: Thawte Subject: CSS

Accelerator? Internet Accelerator Proxy Clients Web Servers Certificate Issuance Requires: Generating a Public Key Pair Signing the Certificate

Public Key Re-Use CSS Proxied Certificate Proxied Yahoo! Certificate

Trusted Root? Root modulus size is 512 bits 512-bit RSA Challenge was factored in August 1999 576-bit RSA Challenge was factored in December 2003 Root validity period is 50 years

Other concerns Not affected by most Anti-virus software More nefarious groups could do far worse: Password / ID theft Credit Card Numbers Phishing possibilities Legal Issues GLBA, HIPAA California SB 1386

What Can Be Done? On the Client: Anti-Spyware Software Know Your Trusted Roots In the Enterprise: Acceptable Usage Policies Installed Software Inventories Anti-Spyware Software Group Policy or Scripting to Audit Root Store

Hypothetical Scenario Sensitive Customer Data Insurance Co. SSL Tunnel Customers Insurance Agent?? Can the Web Server Detect or Prevent this Attack? (Other than by checking the IP address?)

SSL with Client Certificates Internet Accelerator Proxy 2 1 ` 3 Client SSL-enabled Web Server 1. Client s browser loads an SSL-protected web page; requests SSL session from server 2. Request is routed to Internet Accelerator, which makes its own request of the server 3. Server responds with SSL certificate, AND requests that the client provide their certificate also 4. Accelerator Proxy does not have a client certificate (or private key) for the web service 5. Client is told that he cannot connect

Detection / Prevention from Web Server Client-side Code (Java or ActiveX) Make SSL Site Certificate Available Downloadable from website as data Establish a new SSL Connection back to Web Server Download real site certificate Obtain copy of SSL certificate used to establish connection Java: socket.getsession().getpeercertificates() ActiveX: WinHTTPQueryOption() (requires Win2k SP3, WinXP SP1) InternetQueryOption() (ASCII information only)

Lessons Learned Importance of Trusted Root Store Know your roots Audit your roots Anti-Spyware Deserves Equal Footing With Anti-virus