A number of hack attacks recently have made many question the fundamental security of the internet - hack attacks that have brought into question a system that until now was considered be bulletproof. However, with appropriate good timing, two new security schemes are coming to the rescue.
Hypertext Transfer Protocol Secure - or HTTPS - is the technical name for the padlock system used within web browsers that shows if a secure connection is in use. It's typically used by online banking sites and webmail providers, and it relies on a document known as a security certificate, which is issued by a trusted number of certificate authorities (CAs) around the world. Web browsers use these certificates to verify the authenticity of various sites.
However, in March a hacker (or hacker group) called Ich Sun accessed the computer systems for Comodo - the second largest CA in the world - and used its systems to issue fraudulent certificates for Google, Microsoft, Skype and Yahoo, amongst others. These certificates could be used to make a fake site look legitimate. The certificates were hastily revoked once the hack was discovered, and Microsoft issued an update to ensure that Windows users weren't duped.
A few days ago, Ich Sun hit the headlines again, this time claiming to have breached several more CA systems. It's not clear if Ich Sun issued any other certificates at this time.
This sort of certificate theft isn't a huge threat unless it's used as part of a highly sophisticated hack attack involving taking control of internet domain-name servers. Feasibly, Ich Sun could have issued certificates for domains that look like the real deal - paypall.com rather than paypal.com, for example. These could then have been used in phishing attacks in which people, seeing the trusted padlock symbol provided by the fraudulent certificate, simply wouldn't be see they were being fooled.
But help is on the way.
New security for new threats
The first new development is DNSSEC, as I explained in an earlier story. Assuming this takes off over the coming years (it was only enabled for the .com domain last Thursday), it should provide a reasonable method of proving that we're connected to the site our browser says we are.
Secondly, Google has begun building what it calls the Google Certificate Catalogue. This is a web-accessible database of what Google considers to be valid security certificates. It's updated as frequently as Google's search catalogue because the same web crawler bots collect the data. Although it's at an early stage right now, the catalogue indicates not only if a certificate should be considered valid but also for how long Google has known about it. The simple concept is that, if the Google Certificate Catalogue doesn't know about a certificate, it should be considered questionable.
It's possible to probe the database right now but it's not easy and requires a Linux or Mac command-line (the database is stored in the form of a domain-name server so can be queried easily). In future there's a chance the feature will be built-into browsers like Google Chrome or Mozilla Firefox although it will have to be a user-selected option because the results will require interpretation - a certificate that's only been in the database for one day doesn't necessarily indicate dodgy shenanigans, for example. It could be that the certificate has recently been renewed.
The project is very similar to Perspectives, an open system created by a handful of security researchers. However, Google's system has the simple advantage of being created by an internet heavyweight. Google says the catalogue is available to whoever wishes to use it.
Many are suggesting that the Comodo attack along with others from Anonymous over the Wikileaks affair are beginning to expose how insecure the web is now. This is certainly a challenging time but with companies like Google, Mozilla and Microsoft providing frequent updates to their browsers, along with technological advancements, there's no evidence to suggest that technology has stagnated and that we can't keep abreast of current events.