{"id":662,"date":"2017-11-10T16:11:27","date_gmt":"2017-11-10T16:11:27","guid":{"rendered":"https:\/\/securitycurve.com\/?p=662"},"modified":"2017-11-10T16:11:27","modified_gmt":"2017-11-10T16:11:27","slug":"vault-8-should-former-symantec-cas-go-the-way-of-wosign","status":"publish","type":"post","link":"https:\/\/securitycurve.com\/?p=662","title":{"rendered":"Vault 8: Should Former Symantec CA&#8217;s go the way of WoSign?"},"content":{"rendered":"<p><a href=\"https:\/\/securitycurve.com\/wp-content\/uploads\/2017\/11\/vault8.jpg\"><img decoding=\"async\" class=\"alignright  wp-image-663 lazyload\" data-src=\"https:\/\/securitycurve.com\/wp-content\/uploads\/2017\/11\/vault8-1024x576.jpg\" alt=\"\" width=\"706\" height=\"397\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 706px; --smush-placeholder-aspect-ratio: 706\/397;\" \/><\/a>Have you heard about the Vault 8 stuff?\u00a0 If you haven&#8217;t, Vault 8 is a new <a href=\"https:\/\/wikileaks.org\/vault8\/\">repository at Wikileaks<\/a> for US Intelligence software tools.\u00a0 One particularly interesting thing they put out there is <a href=\"https:\/\/wikileaks.org\/vault8\/#Hive\">Hive<\/a>\u00a0&#8212; I&#8217;ll warn you that I haven&#8217;t gone through it with a fine-toothed comb or anything, but one of the things folks are noticing is that it <a href=\"https:\/\/www.theregister.co.uk\/2017\/11\/10\/cia_kaspersky_fake_certs_ploy\/\">contains a mechanism to use fraudulent Kaspersky certificates, issued by Thawte,<\/a> to aid in exfiltration.<\/p>\n<p>That&#8217;s interesting on it&#8217;s own, and I feel bad for Kaspersky because they&#8217;re already struggling to get out from under the bus&#8230;\u00a0 but really for me it&#8217;s a bit of &#8220;last straw&#8221; for Thawte and maybe all the CA&#8217;s-that-were-formerly-Symantec on the whole.\u00a0 Yes, I know this is just one instance of one bogus cert&#8230; but it seems like every time I read about certificate problems, Thawte has something to do with it.\u00a0 I never really unpacked the data (until now), and I think Thawte is reflected disproportionately high.\u00a0 I&#8217;ll explain what I mean, but first let&#8217;s tee it up.<\/p>\n<p>First, you probably recall that I&#8217;ve been griping on this blog about the public PKI security model.\u00a0 I did it when <a href=\"https:\/\/securitycurve.com\/wosign\/\">WoSign got the boot<\/a> from the last of the browser trusted root stores, I did it again\u00a0<a href=\"https:\/\/securitycurve.com\/looking-at-you-ca-browser-forum-economics-of-cas-certificate-authorities-and-viability-of-public-pki\/\">to comment on the meteoric rise of Let&#8217;sEncrypt<\/a>\u00a0(arguing that the economics of public CA&#8217;s support this) and then again when Google <a href=\"https:\/\/securitycurve.com\/google-abandoning-key-pinning\/\">announced plans to pull HPKP out of Chrome<\/a>\u00a0(it didn&#8217;t address the root issue anyway and it&#8217;s better done at a different level of the stack).\u00a0 Anyway, you&#8217;ve probably noticed I&#8217;ve been beating a drum that the public PKI model is broken.\u00a0 I&#8217;m not the first to say that of course.\u00a0 That said, I flatter myself that I&#8217;m maybe early to the table in trying to unpack the specific microeconomic reasons why.\u00a0 Maybe others are out there researching that and I just don&#8217;t know about it.\u00a0 If somebody knows of formal research in this area, I would greatly appreciate you telling me about it.<\/p>\n<p>Anyway, I&#8217;ve explained why the case is what it is, so I&#8217;ll spare you going through it again (if you&#8217;re really interested, the Let&#8217;sEncrypt link I referenced above will go through it in more detail).\u00a0 Just trust me when I tell you that the economics favor overall reduction in the security of certificate issuance processes over time.\u00a0 You can take it to the bank.\u00a0 It likewise frustrates me that nobody seems to care.\u00a0 I promise you, this is every bit as big a problem as something like EternalBlue &#8212; it&#8217;s arguably worse because it facilitates targeted, stealth attacks against pretty much whomever.\u00a0 No, there&#8217;s no &#8220;zombie apocalypse&#8221; scenario like WannaCry that originates from the PKI problem.\u00a0 It&#8217;s more subtle, which I&#8217;d argue is worse.\u00a0 So we know two things: 1) the rigor of certificate issuance processes and security measures will erode over time.\u00a0 2) As they do so, the probability of bogus certs will tend to increase.\u00a0 In fact, if you&#8217;ve been paying attention, you can see it at work right now.<\/p>\n<p>A decade ago, it was unusual to hear about bogus certs.\u00a0 Not that they couldn&#8217;t happen or anything, just that it was rare.\u00a0 Remember <a href=\"https:\/\/en.wikipedia.org\/wiki\/DigiNotar\">DigiNotar<\/a>?\u00a0 The reason you remember it &#8211; and the reason that CA no longer exists today &#8211; is precisely because it was so unusual for fraudulent certificates to be issued.\u00a0 Now?\u00a0 It&#8217;s just something that happens.\u00a0 Which gets me back to Thawte.\u00a0 A while back, some enterprising researchers published a paper called &#8220;Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI&#8221;.\u00a0 It&#8217;s a good paper.\u00a0 I recommend you <a href=\"http:\/\/www.umiacs.umd.edu\/~tdumitra\/papers\/CCS-2017.pdf\">go read it<\/a>.\u00a0 \u00a0The reason I think the work they did is so valuable though is that they didn&#8217;t just analyze the problem, but they also <a href=\"http:\/\/signedmalware.org\/\">published the supporting data and CA information<\/a>.\u00a0 It contains a list of compromised code signing certificates.\u00a0 Which, should one be interested in doing so, one can import into Excel and do a comparative analysis of which CA&#8217;s are there, and compare that to the marketshare of certificates they issue.\u00a0 In fact, I did that this morning.<\/p>\n<p>Here&#8217;s what I found out.\u00a0 Thawte, as you might know, was owned by Symantec as of last year.\u00a0 Symantec <a href=\"http:\/\/fortune.com\/2017\/08\/02\/symantec-web-certificates-sale-thoma-bravo\/\">sold it off<\/a> in large part probably because <a href=\"https:\/\/www.theregister.co.uk\/2017\/09\/12\/chrome_66_to_reject_symantec_certs\/\">Google decided to pull it out of Chrome<\/a>.\u00a0 Now, Thawte specifically represents just about 1.8% of the marketshare.\u00a0 I base that on <a href=\"https:\/\/w3techs.com\/technologies\/overview\/ssl_certificate\/all\">Symantec as a group (I&#8217;m calling it that even though it&#8217;s sold because that&#8217;s how the source data refers to it) having 13% marketshare<\/a>\u00a0and Thawte being <a href=\"https:\/\/w3techs.com\/technologies\/details\/sc-groupsymantec\/all\/all\">14.2 percent of the Symantec group<\/a>.\u00a0 That&#8217;s generous, by the way since the &#8220;marketshare&#8221; number is different from the &#8220;absolute usage&#8221; number.\u00a0 If you use absolute usage, Thawte comes in at .07%.\u00a0 Now hold that number in your head.\u00a0 If you then look at the issuers on the signed malware list, what is the population of Thawte certs specifically?\u00a0 Just about 40% (37.7).\u00a0 If you include all the CA&#8217;s that were formerly Symantec?\u00a0 74%.<\/p>\n<p>Now, it bears saying that this is not really a systematic or scientific analysis.\u00a0 There are a few reasons why.\u00a0 First, and most obviously, these are code signing certs not server certs.\u00a0 We can posit that there&#8217;s maybe a correlation for marketshare between the two groups, but it&#8217;s highly spurious to the point that I wouldn&#8217;t bet on it.\u00a0 Second,\u00a0I don&#8217;t know the methodology for why they picked the CA&#8217;s they did for the signed malware stuff.\u00a0 So those things could skew the population, and thereby the integrity of the above.\u00a0 \u00a0That said, I do think one can reasonably conclude a few things.\u00a0 First, I think we can surmise that Google was right to drop these.\u00a0 Second, we can safely say that Symantec was probably pretty smart to unload them.<\/p>\n<p>It likewise opens a few questions. One is the question of why Google is on its own in supporting these.\u00a0 I haven&#8217;t heard yet that others are dropping these CA&#8217;s &#8211; maybe they are and I just missed it.\u00a0 The second is whether the properties that were Symantec conform to the CAB minimum baseline.\u00a0 If they don&#8217;t, it&#8217;s a problem because you&#8217;d expect browser (and OS) vendors to use it &#8212; because that&#8217;s the purpose.\u00a0 More importantly, it&#8217;s pretty much the last line of defense and underpins the whole of the PKI ecosystem.\u00a0 If they do adhere to the baseline, it makes me wonder about their utility &#8212; like whether the bar is high enough.\u00a0 Either way, it isn&#8217;t good.\u00a0 Practitioners need to pay attention to this.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you heard about the Vault 8 stuff?\u00a0 If you haven&#8217;t, Vault 8 is a new repository at Wikileaks for US Intelligence software tools.\u00a0 One particularly interesting thing they put out there is Hive\u00a0&#8212; I&#8217;ll warn you that I haven&#8217;t gone through it with a fine-toothed comb or anything, but one of the things folks [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[22,91,116,117,124,128],"class_list":["post-662","post","type-post","status-publish","format-standard","hentry","category-security","tag-ca","tag-pki","tag-symantec","tag-thawte","tag-vault8","tag-wikileaks"],"_links":{"self":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=662"}],"version-history":[{"count":0,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/662\/revisions"}],"wp:attachment":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}