COMMAND
IE
SYSTEMS AFFECTED
IE 5.0, 5.1
PROBLEM
Frank Knobbe found following. Remember the discovery by Mitja
Kolsek regarding bypassing the security warnings when you view
SSL protected sites with an invalid certificate? Back then Frank
asked him what warnings he meant since he never seen one.
Apparently the reason he never seen that warning was because he
had configured my Internet Explorer (5.1) to 'Check for Server
Certificate Revocation' and 'Check for Publisher Certificate
Revocation' (under the Advanced Tab in the Internet Options).
Testing has shown that with these checkboxes de-selected, I.E.
will warn about sites where the domain name doesn't match the one
listed in the certificate (to warn you about site spoofing).
However, with these checkboxes selected, no warning is presented
at all.
To verify select above mentioned settings. Get the IP address
of your favorite SSL protected site and enter it into your local
HOST file with a mock domain name (for example test.com). Then
open I.E. and go to https://test.com and the page will be
displayed without any warning notifications. It displays the
lock in the Status Bar as usual.
When you do a right click on the page and check the status, it
will list that it can not validate the certificate, as it should.
It's just that no warning will be presented to alert the user
that the site is not valid.
It is unknown if this problem only occurs on SSL certificates that
do not list a revocation URL, or if it applies to all certs.
Frank tested it on patched and unpatched versions of I.E. 5.0 and
5.1.
SOLUTION
Well, obviously de-select the mentioned settings.
For web site operators: Implement anti-spoofing redirections
(which more and more are using, that's good). This is merely a
suggestions. It does not in any way present a solution to the
problem or even provide a workaround. The only workaround so far
is to disable the Cert Revocation Check settings.
For certificate issuer: Make use of standards and implement them
fully. List a revocation URL in the certificate if you have one.
The current state is that not every CA adheres to the practice of
including CRL (Certificate Revocation List) URL's in the SSL cert
issued to a website operator. Hence there is no guarantee to web
browser/web surfers that the SSL protected site is in fact still
valid. Since certificates have an expiration date, an invalidated
certificate would expire, but no immediate revocation check can be
performed. So why do we have these settings in I.E. if no one
uses them? Issuers should include CRL URL's in the certificates
and browser should check them. Otherwise, how can we trust that a
certificate is still valid? Well, wouldn't be so bad if I.E.
would just ignore the fact that no CRL is present, but apparently
is ignores far more than that with these setting turned on...
Anti-Spoofing Redirects: Well, you probably won't find that in any
dictionary. What writer meant by it is this. Most web sites can
be addressed by their domain name or IP address in the URL. If a
fake domain name is configured with the correct IP address, a web
browser will connect to fake.com (which has the IP address of,
let's say, nbc.com) and display the content as usual (the content
of nbc.com). The URL still says fake.com. The Anti-Spoofing
Redirection simply checks the URL and if it is not nbc.com (to
stay with our example), it will redirect the browser to nbc.com.
This is accomplished with a few lines of server side script code
(i.e. ASP). The reason? This will guarantee that the browser
displays the correct URL. A scenario, where this could be of
importance might be a fake press announcement on the Internet
claiming that ABC bought NBC. At the same time ABC's domain
record is poisoned or hijacked and www.abc.com now actually has
the IP address of www.nbc.com. A browser trying to reach
www.abc.com will get the pages from www.nbc.com although the URL
still says www.abc.com. With a redirection it would display
www.nbc.com. Again, this does nothing to prevent the hijacking
of domains or copying a web site to be displayed on a rogue web
server. NBC's web site is out of the loop so this suggestion
does not stop or prevent this sort of thing.