meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, August 4th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 4 August 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Certificate Transparency; OUCH Newsletter (Ransomware); HTTP/2 Vulnerabilities

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, August 4th, 2016 edition of the Sandtonet Storm Center's Stormcast.

0:08.2

My name is Johannes Ulrich and I'm recording from Boston Message.

0:12.5

I've talked in the past in this podcast and in our diaries a lot about certificate transparency.

0:19.2

Certificate transparency is a standard that's heavily supported

0:23.8

by Google that essentially requires that certificate authorities will publish logs of all the

0:32.3

certificates that they are issuing. The reason this is proposed is that in the past it has happened that

0:41.3

criminals were able to convince certificate authorities in issuing them legitimate certificates.

0:49.3

And then of course in hindsight the entire certificate revocation process is somewhat unreliable.

0:57.0

Now with certificate transparency, you will be able to search these certificate transparency

1:03.0

logs in order to figure out if someone did request a certificate for any domain name that you are responsible for.

1:13.6

Now the problem of the system is that the published data does include all host names that the certificate

1:22.6

verifies. So by publishing the certificate transparency logs and making them searchable,

1:30.5

I can now search for companies somewhat secretive host names that they may not wish to be publicly

1:38.5

known, but they did request a certificate for that host name from a public certificate authority.

1:46.8

At this point, there is no great work around here.

1:49.6

Of course, you can run your own internal certificate authority for these names,

1:54.3

but then again, everybody using the particular site has to trust it,

1:58.3

which of course can be a little bit tricky when you're dealing here

2:01.5

with business partners and not just internal users. In the future, an update of the

2:08.5

certificate transparency standard will allow you to publish a somewhat priviated form of the

2:15.2

host name, just a question mark. Dot your domain name in order to hide the full host name that is verified by this certificate.

2:25.4

But this standard has not been finalized yet.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.