We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,258 News Articles

Google fights to make HTTPS browsing safe

Begins building Google Certificate Catalogue

A number of hack attacks recently have made many question the fundamental security of the internet - hack attacks that have brought into question a system that until now was considered be bulletproof. However, with appropriate good timing, two new security schemes are coming to the rescue.

Hypertext Transfer Protocol Secure - or HTTPS - is the technical name for the padlock system used within web browsers that shows if a secure connection is in use. It's typically used by online banking sites and webmail providers, and it relies on a document known as a security certificate, which is issued by a trusted number of certificate authorities (CAs) around the world. Web browsers use these certificates to verify the authenticity of various sites.

However, in March a hacker (or hacker group) called Ich Sun accessed the computer systems for Comodo - the second largest CA in the world - and used its systems to issue fraudulent certificates for Google, Microsoft, Skype and Yahoo, amongst others. These certificates could be used to make a fake site look legitimate. The certificates were hastily revoked once the hack was discovered, and Microsoft issued an update to ensure that Windows users weren't duped.

A few days ago, Ich Sun hit the headlines again, this time claiming to have breached several more CA systems. It's not clear if Ich Sun issued any other certificates at this time.

This sort of certificate theft isn't a huge threat unless it's used as part of a highly sophisticated hack attack involving taking control of  internet domain-name servers. Feasibly, Ich Sun could have issued certificates for domains that look like the real deal - paypall.com rather than paypal.com, for example. These could then have been used in phishing attacks in which people, seeing the trusted padlock symbol provided by the fraudulent certificate, simply wouldn't be see they were being fooled.

But help is on the way.

New security for new threats

The first new development is DNSSEC, as I explained in an earlier story. Assuming this takes off over the coming years (it was only enabled for the .com domain last Thursday), it should provide a reasonable method of proving that we're connected to the site our browser says we are.

Secondly, Google has begun building what it calls the Google Certificate Catalogue. This is a web-accessible database of what Google considers to be valid security certificates. It's updated as frequently as Google's search catalogue because the same web crawler bots collect the data. Although it's at an early stage right now, the catalogue indicates not only if a certificate should be considered valid but also for how long Google has known about it. The simple concept is that, if the Google Certificate Catalogue doesn't know about a certificate, it should be considered questionable.

It's possible to probe the database right now but it's not easy and requires a Linux or Mac command-line (the database is stored in the form of a domain-name server so can be queried easily). In future there's a chance the feature will be built-into browsers like Google Chrome or Mozilla Firefox although it will have to be a user-selected option because the results will require interpretation - a certificate that's only been in the database for one day doesn't necessarily indicate dodgy shenanigans, for example. It could be that the certificate has recently been renewed.

The project is very similar to Perspectives, an open system created by a handful of security researchers. However, Google's system has the simple advantage of being created by an internet heavyweight. Google says the catalogue is available to whoever wishes to use it.

Many are suggesting that the Comodo attack along with others from Anonymous over the Wikileaks affair are beginning to expose how insecure the web is now. This is certainly a challenging time but with companies like Google, Mozilla and Microsoft providing frequent updates to their browsers, along with technological advancements, there's no evidence to suggest that technology has stagnated and that we can't keep abreast of current events.

See also: Solo Iranian hacker claims credit for Comodo attack


IDG UK Sites

Best Christmas 2014 UK tech deals, Boxing Day 2014 UK tech deals & January sales 2015 UK tech...

IDG UK Sites

LED vs Halogen: Why now could be the right time to invest in LED bulbs

IDG UK Sites

Christmas' best ads: See great festive spots studios have created to promote themselves and clients

IDG UK Sites

Stop running out of cellular data on your iPhone, see which apps use the most data