- 浏览: 135657 次
- 性别:
- 来自: 南宁
文章分类
- 全部博客 (137)
- J2SE API基础 (19)
- JAVA Structure/Algorithm (1)
- 设计模式及UML(pd/rose) (11)
- SSH (32)
- JPA/EJB/JSF (0)
- Jsp/Servlet (1)
- XML (0)
- DWR/Dojo/JQuery(Ajax) (1)
- Js/css/HTML (3)
- Java报表开发 (0)
- 网络协议及认证加密算法 (2)
- Java多线程网络编程 (1)
- Lucence (0)
- Oracle Developer (5)
- Oracle DBA (3)
- mysql/SQLServer/DB2 (5)
- Weblogic配置/调试 (0)
- Tomcat/JBoss/Websphere (10)
- Linux/Unix操作部署及shell编程 (9)
- C/C++编程 (4)
- 系统分析 (0)
- 项目管理(CVS&风险控制) (0)
- JUnit单元和J2EE集成测试 (2)
- 软设/招聘 (6)
- IT English (8)
- Mathematics/Data Mining (1)
- Android开发爱好 (1)
- Flash制作爱好 (0)
- Professional wisdom (4)
- 序言 (1)
- 聊天记录 (0)
- 理想 (3)
- 承诺 (0)
- oifuslfjsldkj_chatrecord (1)
最新评论
-
blues1021:
dafeiwudi 写道什么叫外频和陪频啊?一般电脑都显示主频 ...
计算机组成原理和结构-时钟周期、机器周期、总线周期、指令周期含义和关系 -
dafeiwudi:
什么叫外频和陪频啊?一般电脑都显示主频,它不表示运算速递,我们 ...
计算机组成原理和结构-时钟周期、机器周期、总线周期、指令周期含义和关系
Fraudulent Google certificate points to Internet attack
- 博客分类:
- IT English
A Dutch company appears to have issued a digital certificate for Google.com to someone other than Google, who may be using it to try to re-direct traffic of users based in Iran.
Yesterday, someone reported on a Google support site that when attempting to log in to Gmail the browser issued a warning for the digital certificate used as proof that the site is legitimate, according to this thread on a Google support forum site.
"Today, when I tried to login to my Gmail account I saw a certificate warning in Chrome," someone using the screen name "alibo" wrote. "I think my ISP or my government did this attack (because I live in Iran and you may hear something about the story of Comodo hacker!)" Alibo then posted a screenshot and the text of the certificate. The screenshot page was not accessible.
In this case the browser of the person reporting the problem warned that there was a problem with the digital certificate. However, it's unclear what triggered the warning and other browsers may not. In that event, a user could end up on a site that purports to be google.com but isn't.
CNET verified that the digital certificate is fraudulent. This Pastebin post details how to verify that a certificate is real and notes that it was issued in July. More information on how to mitigate the risk from the DigiNotar certificate is provided on this Facebook page from Ryan Hurst, manager of advertising security engineering at Microsoft.
A Google spokesman provided CNET with this statement: "A Chrome security feature warned the user of the invalid certificate and blocked them from visiting the attacker's site. We're pleased that the security measures in Chrome protected the user and brought this attack to the public's attention. While we investigate, we plan to block any sites whose certificates were signed by DigiNotar."
Mozilla said in a blog post that it was "Because the extent of the mis-issuance is not clear, we are releasing new versions of Firefox ... shortly that will revoke trust in the DigiNotar root and protect users from this attack. We encourage all users to keep their software up-to-date by regularly applying security updates. Users can also manually disable the DigiNotar root through the Firefox preferences."
The certificate was issued by DigiNotar, based in the Netherlands. Representatives from the company did not immediately respond to an e-mail seeking comment today and an automated message said the offices were closed for the night and offered no voice-mail option. A phone call and e-mail to Vasco Data Security, parent company of DigiNotar, were not immediately returned.
The situation is similar to one that happened in March in which spoofed certificates were found involving Google, Yahoo, Microsoft, and other major sites and they used Internet Protocol addresses in Iran. In that case, the fraudulent digital certificates were acquired through reseller partners of certificate authority Comodo and a 21-year-old Iranian patriot took credit for the attack, saying he was protesting U.S. foreign policy.
Moxie Marlinspike, chief technology officer of mobile security firm Whisper Systems and an expert on Internet authentication infrastructure, warned against jumping to conclusions about who is behind the attack.
"Clearly something is amiss. There's a rogue cert for all of Google services in the wild," he told CNET. "Of course many people are quick to claim that the state of Iran is responsible for all this but I think it's probably too soon to draw that conclusion. There doesn't seem to be any specific evidence."
These situations happen all the time, and rather than point fingers, the industry should fix the underlying problem, he said. In the meantime, individual Web surfers can protect themselves by using a Firefox plug-in Marlinspike developed called Convergence . "My hope is that this will be integrated into Web browsers themselves" in the future, he said.
These attacks illustrate a fundamental weakness with the current Web site authentication system in which third parties issue certificates that prove that a Web site is legitimate when making an "https://" connection. The list of certificate issuers has ballooned over the years to approximately 650 organizations, which may not always follow the strictest security procedures. And each one has a copy of the Web's master keys. There is no automated process to revoke fraudulent certificates, nor is there a public list of certificates that companies like Comodo have issued, or even which of its resellers or partners have been given a duplicate set of the master keys. And there are no mechanisms to prevent fraudulent certificates for Yahoo Mail or Gmail from being issued by compromised companies, or repressive regimes bent on surveillance.
Today's system gives browser makers tremendous responsibility. Any list of so-called certificate authorities they include will be trusted by billions of Web browsers around the world, unless users take the time to change the settings.
"I expect this type of attack to become somewhat commonplace in time," said Roel Schouwenberg, senior researcher at Kaspersky Lab. "And in this case we may be looking at a double whammy - not only does SSL suffer yet another blow, we may also be looking at a serious compromise within Vasco. The latter could have a very significant impact."
Update at 3:36 p.m. PT with Mozilla comment and mitigation information from Microsoft representative 3:27 p.m. PT with comment from Google, Marlinspike and Schouwenberg and 1:45 p.m. PT : Added details about the browser warning, and about CNET attempts to reach Vasco Data Security. and
CNET's Declan McCullagh contributed to this report.
发表评论
-
Linux Foundation Releases Specification to Ease Licensing Headaches
2011-08-29 13:37 683qualify取得资格,使胜任 quality品质,特性 ... -
游泳英文词汇-工厂模式游泳小程序
2011-08-10 01:55 1160prelim预备,预赛 seed种子,选出选手 lane小 ... -
Repositioning Java.net in Dev Ecosystem at Meruvian/Indonesia
2011-08-10 01:54 591institution:??nst??tu??n,惯例,习 ... -
Struts1中的<form-bean>和<action-mapping>属性
2011-08-10 01:54 11101.<form-bean> Con ... -
medium vote theory
2011-05-29 13:49 738medium vote theory中间立场理论, stra ... -
home agent and foreign agent
2011-04-11 00:21 730词汇: mechanism 机械 构造 maint ... -
words about Apache struts
2011-04-16 01:00 585buzzword 流行词 complaint 抱怨 com ...
相关推荐
Catch the Black Sheep: Unified Shilling Attack Detection based on Fraudulent Action Propagation
For years, one of the most compelling selling points of Macs has been their apparent freedom from many of the security problems that have long plagued Windows users. Countless people have switched ...
ccording to the Internet research firm comScore, goods and services worthmorethan$17billionweresoldviatheInternetinthefirstquar- ter of 2002. It has been our experience that wherever money goes, crime...
检测欺诈性信用卡交易 训练了隔离林异常检测算法,该算法可在预测测试集上的欺诈性交易时提供96.5%的准确性。 该数据集是一个包含284,807个事务的偏斜数据集,其中只有492个事务是易处理的(0.172%)。...
data-mining programs that learn to detect fraudulent credit card transactions, to information-filtering systems that learn users' reading preferences, to autonomous vehicles that learn to drive on ...
Data Mining with R: Learning with Case Studies, Second Edition uses practical examples to illustrate the power of R and data mining. Providing an extensive update to the best-selling first edition, ...
该数据集收集了1998年至2007年之间的2500多个“尼日利亚”欺诈信。 fradulent_emails.txt
The Licensee especially undertakes to keep secret software and documentation and not to disclose them to any third party, neither as a whole nor in part, or pass them to any third party, unless he is...
Outliers arise due to mechanical faults, changes in system behaviour, fraudulent behaviour, human error, instrument error or simply through natural deviations in populations. Their detection can ...
1. The team lost the game and the coach had to admit the ______ truth, though he blamed the referee for the result. A grim B grimace C grin D fraudulent 2. The possessive _______ in Tiffany makes ...
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected...
Touch-less based acquired images are free from latent fingerprint issues that can lead to fraudulent use. Hence, the security and privacy protection of fingerprint biometric templates is consolidated...
在幕后,它执行的检查要比欧洲刑警组织建议的11个手动步骤多得多:https://www.europol.europa.eu/activities-services/public-awareness-and-prevention-guides/how-to-detect-fraudulent -sites-selling-fakes此...
1.6.1 Basic communications on the Internet. . . . . . . . . . . . . . . . 32 1.6.2 Computer security and computer forensics . . . . . . . . . . . . . 35 v 1.7 Overview of the following chapters. . . ....
随着人们对合法促销的在线产品评论的兴趣日益浓厚,欺诈性评论也随之增加。 但是,除了用于初始欺诈检测的算法之外,对于审查门户在检测到欺诈性评论之后应采取的措施知之甚少。 在本文中,我们通过研究消费者如何...
在当前的全球经济中,保险公司的生存取决于其对客户需求做出React的能力,这是对保险索赔的解决。 所有保险公司都面临着快速解决索赔和认证索赔的矛盾目标。 欺诈检测中人类专家成本的不断上涨已导致许多公司开发...
如今,信用卡的总交易量不断增加,欺诈交易案件也呈上升趋势,每年给金融机构和银行业造成数十亿美元的损失。 因此,需要能够有效且高效地识别和防止此类欺诈交易的稳健、可靠的机制。 一些数据挖掘技术有助于检测...