As consumers, we've been taught to trust the padlock icon that appears on the address bar of our browsers. We're told it's a sign our communication with a website is safe. But an incident this week involving Google and a Turkish security company belies that notion.
The company, TurkTrust, revealed this week that in August 2011 it accidentally issued to two master keys to two "entities." Master keys, which are called intermediate certificates, allow the entities to create digital certificates for any domain on the Internet.
Digital certificates are actually encryption keys used to verify a website is what it says it is. The certificate for your bank, for example, verifies to your browser that you're actually talking to your bank when you do online banking.
Certificates are used to encrypt information between you and a website, too. That's what the green padlock on your browser's address bar means. The browser is communicating with the website using Secure Sockets Layer, after verification of its authenticity.
An Internet miscreant with a bogus certificate who can intercept communication between you and a trusted website can fool your browser into believing it's communicating with the trusted site and hijack your communication. That's called a "man in the middle attack" because the thief sits between you and the trusted site.
Error fixed, problem continues
TurkTust's mistake was discovered by Google on Christmas Eve by a feature it has in its Chrome browser platform that raises a red flag to Google when someone tries to use the platform with an unauthorized certificate.
After discovering the certificate problem, Google informed TurkTrust of the situation, as well as Microsoft and Mozilla, who have all modified their browser platforms to block rogue certificates created with the intermediate certificate authority.
This certificate snafu is just the latest sign that the existing system of issuing digital certificates needs mending. In March 2011, for example, a company affiliated with certificate issuing authority Comodo was breached and nine bogus certificates issued.
Later in the year, hackers breached a Dutch certificate authority, DigiNotar, and issued dozens of bogus certificates, including one for Google. The fallout from that incident put the company out of business.
Wanted: Next-gen security
A number of proposals have been aired to address the security problems surrounding certificates.
There's Convergence. It allows a browser to get a second opinion about a certificate from a source chosen by a user. "It's a brillant idea, but as soon as you get on a corporate network and you're behind a proxy or behind a network translator, it can break," Chet Wisniewski, a security advisor with Sophos, said in an interview.
There's DNSSEC. It uses the domain naming resolution system--the system that turns the common names of websites into numbers--to create a trusted link between user and website. Not only is the system not easy to understand, but implementation could take years.
Sign up for Computerworld eNewsletters.