Facebook Detect Rogue SSL Certificate:-There are cases when domain owners have been issued TLS/SSL certificates without their consent. Facebook has successfully launched a tool with the help of which the owner can find out such certificates. This can be done by using data which is being collected from many Certificate Transparency (CT) logs. These logs are publicly accessible. As per the CT standard, every Certificate Authority (CA) is required to disclose the certificates that they issue.
As all the CAs around the world do not adopt CT, web security cannot be achieved a 100%. It is important to make it compulsory for all the CAs to adopt Certificate Transparency (CT). Google is the first one to take a drastic step by making CT mandatory in the Chrome browser after Oct 1, 2017. Certificate issued after this date without CT log will not be trusted by Chrome.
Facebook built a tool to detect rogue SSL certificates
Facebook had a good understanding of the importance of adapting CT and decided to build a tool for the public. This tool would help other companies to keep track of SSL certificate issues for their domains. With the help of this tool
The Domain owner can detect a miss-issued certificate within an hour
Facebook has come up with a tool to make it easier for domain owner (or security team) to search and keep track of certificates associated with their domain through CT logs. CT maintains logs listing SSL certificates, which are publicly accessible. CT framework outlines various rules and procedures, such as:
From all the public CT logs, this tool fetches data periodically; it is then synced before performing ‘user-supplied query’. Whenever a new entry in the synced list is detected, users will receive an email notification. There are no restrictions on usage of this tool, so anyone can use it to search for logs for any domain.
As all the CAs around the world do not adopt CT, web security cannot be achieved a 100%. It is important to make it compulsory for all the CAs to adopt Certificate Transparency (CT). Google is the first one to take a drastic step by making CT mandatory in the Chrome browser after Oct 1, 2017. Certificate issued after this date without CT log will not be trusted by Chrome.
Facebook built a tool to detect rogue SSL certificates
Facebook had a good understanding of the importance of adapting CT and decided to build a tool for the public. This tool would help other companies to keep track of SSL certificate issues for their domains. With the help of this tool
The Domain owner can detect a miss-issued certificate within an hour
- Keep track of existing certificates being used
- An Owner can subscribe to receive email alerts when a new certificate appears in CT logs
- Contact concerned CA, who issued the certificate
- Make sure that your identity is not compromised
- Consider revoking that certificate
Facebook has come up with a tool to make it easier for domain owner (or security team) to search and keep track of certificates associated with their domain through CT logs. CT maintains logs listing SSL certificates, which are publicly accessible. CT framework outlines various rules and procedures, such as:
- How CAs and domain owners submit records of TLS certificates to public logs.
- Audit the logs to ensure the certificates are properly added.
- Monitor the logs to look for new entries.
- Mis-issued certificates
- Stolen certificates
- Rogue certificate authorities
From all the public CT logs, this tool fetches data periodically; it is then synced before performing ‘user-supplied query’. Whenever a new entry in the synced list is detected, users will receive an email notification. There are no restrictions on usage of this tool, so anyone can use it to search for logs for any domain.
No comments:
Post a Comment