[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Expired certificate
- Subject: Re: [Full-disclosure] Expired certificate
- From: Junk Meat <junkmeat@xxxxxxxxxxx>
- Date: Sat, 17 Jul 2010 11:56:23 -0400
What part of my thread suggests making unplanned changes in a live
environment? All that was said was the re-issuance of a certificate and
it's installation is a relatively simple process. So you believe its
alright to let a certificate remain expired for two weeks?
Don't worry about educating me, there is nothing you have said that I
don't already know... it doesn't even sound like you have anything
intelligent to articulate besides petty criticism and contemptuous remarks.
On 7/16/2010 5:16 PM, bk wrote:
> So basically you advocate making unplanned changes whenever someone feels
> like it?
>
> The only problem here is that they let the cert expire. Being responsible
> about conducting maintenance, instead of having a knee-jerk reaction, isn't
> to be faulted.
>
> If you think you can write better secure file transfer software, no one is
> stopping you. You'll make a fortune. Just remember it has to support more
> than half a dozen different protocols, support dozens of nodes talking to the
> same storage backends, synchronize data across datacenters, support triggered
> actions at multiple places in the transaction across multiple protocols,
> support multiple payload encryption protocols, allow single-sign-on
> authentication with third-party vendors, etc, etc, etc. Oh yeah, it all has
> to pass independent code-review by external auditors. At that rate,
> supporting instant application of new certs in a multi-tiered environment
> with bi-directional trust is a cake-walk in comparison.
>
> Simple, right?
>
> I'm done educating you. I know the software and I know what I'm talking
> about; clearly you know neither.
>
> On Jul 16, 2010, at 12:49 PM, Junk Meat wrote:
>
>
>> chort or whatever your name is, some of us know what we're doing and don't
>> need to wait 2 weeks for a lousy ssl cert update much less a daemon
>> restart... give me a break.
>>
>> Quit defending the State of California, if they were so up on security they
>> shouldn't have passed SB1386 or any other legislation for that matter.
>> Certificate authorities notify their customers well in advance of expiring
>> certs, multiple times in fact, there's no excuse for that and then expecting
>> your clients to violate best practice afterward. As far as change control
>> and system complexity, wise organizations keep things simple not overly
>> complex.
>>
>> Shawn Dermenjian
>>
>> On 7/16/2010 3:11 PM, bk wrote:
>>
>>> Maybe you should know what you're talking about before you speculate. Most
>>> daemons require a restart when you change their cert. When you're talking
>>> about a service that has guaranteed up-time, it can only be taken down for
>>> scheduled maintenance. Changing production systems on a whim totally fails
>>> the 'A' in 'CIA' (and possibly the 'I' too). Wise organizations implement
>>> change-control policies to keep their critical systems from being run-amok
>>> by ad-hoc changes.
>>>
>>> I'm familiar with the software State of California is using for a lot of
>>> their secure file transfers and changing the certificate is not as simple
>>> as you think (although the software is extremely secure). There are
>>> several cross-certification trust relationships that need to be established
>>> for the software to continue working after replacing certs.
>>>
>>> The risk of connecting to a machine with an expired cert is that the cert
>>> may have been revoked. That's why there are expiration dates on certs.
>>> Even if you're using a CRL, you cannot have the CRL contain every cert that
>>> was revoked for all of eternity. The CRL only contains certs from when
>>> they were revoked until when they expire. That keeps CRLs slightly
>>> manageable (although OCSP is a much better solution).
>>>
>>> If you're still connecting to the same IP and getting the same cert (check
>>> the serial number and/or fingerprint), then at least you're sending data to
>>> where you always have in the past. What you want to be weary of is if the
>>> serial number and/or fingerprint change and the cert is still invalid
>>> (those will probably both change when the cert is re-issued, but then the
>>> cert chain and not-before/not-after dates should be legit).
>>>
>>> --
>>> chort
>>>
>>> On Jul 16, 2010, at 11:31 AM, Junk Meat wrote:
>>>
>>>
>>>
>>>> Your right Dan, encryption still does take place. However, its hard to
>>>> understand why renewing
>>>> a certificate would take so long. It should take no longer then 1/2
>>>> hour to receive a renewed
>>>> ssl cert from a certificate authority in my opinion and maybe a few
>>>> minutes to push it out depending
>>>> on the device that is publishing the cert.
>>>>
>>>> You should tell them that your security policy prevents you from making
>>>> a secure ftp transfer to a third
>>>> party with an expired certificate that contains non-public information
>>>> and see how fast they renew
>>>> their certificate.
>>>>
>>>> Basically you are now taking responsibility for any breach in the slight
>>>> chance that anything does
>>>> happen (man-in-the-middle, or otherwise) because you now know about the
>>>> problem. Have them
>>>> acknowledge the expired ssl certificate on their end and sign-off on any
>>>> potential litigation that may
>>>> result if a breach does happen to occur.
>>>>
>>>> -Shawn Dermenjian
>>>>
>>>>
>>>> On 7/16/2010 1:10 PM, Daniel Sichel wrote:
>>>>
>>>>
>>>>> OK, I am in the Golden state (California) where things are not so golden
>>>>> at the moment.
>>>>> I deal with a state agency and use their "secure" ftp site.
>>>>> Their certificate has expired and won't be renewed for a few weeks, but
>>>>> they want me to continue to ftp stuff
>>>>> Using their expired cert.
>>>>>
>>>>> So, as a relative n00b, what are the risks?
>>>>>
>>>>> Does it still encrypt even though, obviously, it can't be verified?
>>>>>
>>>>> My guess is that this still encrypts, but there is no authentication,
>>>>> possibly creating a man in the middle opportunity for some
>>>>> Nefarious person with evil intent (nobody I know, or who is on this
>>>>> list, of course).
>>>>>
>>>>>
>>>>> Anyway, any info would be welcome from the cognoscenti who subscribe
>>>>> here.
>>>>>
>>>>> Thanks,
>>>>> Dan Sichel
>>>>>
>>>>> _______________________________________________
>>>>> Full-Disclosure - We believe in it.
>>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>> _______________________________________________
>>>> Full-Disclosure - We believe in it.
>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>>
>>>>
>>>
>>>
>>>
>
>
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/