iTnews

US govt left vulnerable by expired SSL certs

By Juha Saarinen, iTnews on Oct 17, 2013 7:43PM
US govt left vulnerable by expired SSL certs

Users trained to click through warnings.

Concerns are being raised that the large number of expired Secure Sockets Layer (SSL) certificates employed by United States government web sites may help attackers perform otherwise difficult to accomplish man-in-the-middle interception attacks.

SSL and its successor Transport Layer Security (TLS) let hosts on the Internet exchange X.509 digital certificates to verify their identities and to encrypt the data flows between them, so as to secure communications. A valid certificate is required for communications security to be complete.

Web analysts Netcraft said that partly as a consequence of the US government shutdown, over two hundred official sites now use expired SSL certificates. 

As access to information is necessary for US government employees and ordinary people, Netcraft believes users are effectively being trained to ignore and click through the warning messages. 

Once a user treats the SSL warning message as normal, attackers have a chance to utilise bogus, untrusted certificates to trick users into trusting a site that may be hostile.

Research from University of California [PDF] shows that people are very likely to click through SSL warning messages. Depending on the web browser used, between 57 per cent and 87 per cent of expired certificate or error messages were dismissed by users.

Google Chrome warning for the expired SSL certificate for a US government site
Google Chrome warning for the expired SSL certificate of a US government site

Making the situation worse, common web browsers do not properly warn users of serious problems with SSL certificates, Netcraft says.

"When an SSL error occurs, some browsers only display a single error message, sometimes not the most serious, or even a generic error message for all types of SSL error. An attacker can exploit this vulnerable browser behaviour on SSL sites with expired certificates to perform an almost seamless man-in-the-middle attack.

"By signing his or her own expired SSL certificate for a US government website, the SSL error message displayed for the attacker's SSL certificate is indistinguishable (in some browsers) from the error message produced by the real SSL certificate belonging to the US Government," warned Netcraft.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
certificates government shutdown infosec mitm security ssl united states

Partner Content

MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
MSI launches innovative new laptops
Partner Content MSI launches innovative new laptops
Improving returns from SD-WAN spending
Sponsored Content Improving returns from SD-WAN spending
NCS expands into Australia in partnership with Optus Enterprise
Sponsored Content NCS expands into Australia in partnership with Optus Enterprise

Sponsored Whitepapers

The risky business of open source
The risky business of open source
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation
How to choose a WAF that's right for you
How to choose a WAF that's right for you
The global telco 5G cloud gaming opportunity
The global telco 5G cloud gaming opportunity
Building a ransomware remediation backup strategy
Building a ransomware remediation backup strategy

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
By Juha Saarinen, iTnews
Oct 17 2013
7:43PM
0 Comments

Related Articles

  • JetBrains denies involvement in SolarWinds hack
  • Salesforce open sources malicious server scanner
  • Swatch shuts down some technology systems after cyber attack
  • US charges and sanctions Lazarus Group's Chinese crypto launderers
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Telstra pilots its first neurodiversity recruitment program

Telstra pilots its first neurodiversity recruitment program

Update Chrome or risk remote takeover, US govt warns

Update Chrome or risk remote takeover, US govt warns

Accellion hack behind Reserve Bank of NZ data breach

Accellion hack behind Reserve Bank of NZ data breach

Google unravels state-of-art Android and Windows exploit chains

Google unravels state-of-art Android and Windows exploit chains

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.