4.9 • 696 Ratings
🗓️ 30 August 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, August 30th, 2016 edition of the Sansanet Storms and a Stormcast. |
0:06.0 | My name is Johannes Ulrich and I'm recording from Jacksonville, Florida. |
0:12.0 | Just yesterday I talked about the new version of OpenSEL and how it drops support for protocols like RC4 and ZEL version 2 but with all the attention paid |
0:24.3 | to weaknesses in ESL algorithms the big problem still remains certificate |
0:30.6 | authority the latest one here is WOSign which is a Chinese certificate authority |
0:37.2 | I wasn't familiar with them, but apparently |
0:40.8 | it was possible with this certificate authority if you control a subdomain that you will also |
0:48.6 | be given a certificate for the actual domain. As an example, a user at GitHub was able to get a certificate, |
0:58.7 | not just for his host name at GitHub, but also for GitHub.io. Same happened almost a year ago |
1:07.0 | to a student at the University of Central Florida who was given a certificate not |
1:13.9 | just for his host name at UCF.edu but also for UCF.edu. |
1:21.6 | The GitHub certificate has been revoked. The UCF.edu certificate apparently has not been revoked yet, but then again, |
1:32.3 | revocation causes problems as well. It doesn't always work as well as advertised. The real problem |
1:40.6 | is that one certificate like this is out there, it's really hard to pull it back. |
1:45.7 | The GitHub certificate, for example, was valid for three years and it would have expired June 10, 2018. |
1:54.3 | It is, of course, not known what other certificates may have been issued by WOSign. |
2:01.3 | They do appear to participate in certificate transparency, |
2:05.7 | so you should be able to search certificate transparency logs for your domain name |
2:11.3 | to make sure no invalid certificates have been issued. |
2:14.8 | And the FBI issued a flash alert with details regarding |
2:19.8 | scans against state board of election websites where SQL injection apparently was used in order |
2:28.1 | to exfiltrate data. The alert does not talk about any election manipulation. Sounds like they are more after stealing data than modifying it. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.