Feeds

Trustwave admits crafting SSL snooping certificate

Allowing bosses to spy on staff was wrong, says security biz

The Power of One eBook: Top reasons to choose HP BladeSystem

Certificate Authority Trustwave has revoked a digital certificate that allowed one of its clients to issue valid certificates for any server, thereby allowing one of its customers to intercept their employees' private email communication.

The skeleton-key CA certificate was supplied in a tamper-proof hardware security module (HSM) designed to be used within a data loss prevention (DLP) system. DLP systems are designed to block the accidental or deliberate leaking of company secrets or confidential information.

Using the system, a user's browser or email client would be fooled into thinking it was talking over a secure encrypted link to Gmail, Skype or Hotmail. In reality it was talking to a server on the firm's premises that tapped into communications before relaying them to the genuine server. The DLP system needed to be able to issue different digital certificates from different services on the fly to pull off this approach, which amounts to a man-in-the-middle attack.

The same principle approach might be used in government monitoring activities, such as spying on its own citizens using web services such as Gmail and Skype. Evidence suggests that digital certificates issued by Netherlands-based firm DigiNotar last year were used in this way to eavesdrop on the webmail communications of Iran users last year, although no firm state-sponsored connection has been established.

In a statement published on Sunday, Trustwave said it supplied the tamper-proof digital stamp issuing device to a private customer (not an ISP, government or law enforcement agency), adding that the technology could not have been used outside the private network to which it was supplied. The CA said it had carried out an audit of the target network before supplying the technology.

Nonetheless, it admits the approach was misguided and has promised not to use the technique again. It has also revoked the offending subordinate digital credential-issuing root server.

Sysadmins applying data loss prevention policies that state that a firm has the right the scan and or block webmails sent from work can set up an internal certificate authority on machines connected to a local intranet. That approach wouldn't work on personal mobile devices a user brought into work and this seems to be the reason why Trustwave took the approach it did – which it now admits was misguided.

Trustwave has come clean and admitted it supplied technology that enabled third parties to issue arbitrary SSL server certificates for monitoring, albeit for benign reasons. This is a significant admission and further shakes confidence in the whole digital certificate trust model, already rocked by the Comodo breach, the DigiNotar hack, the SSL BEAST attack and other problems over recent months. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.