Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Raymond T. Racing
Jun 11, 2019

digitalist posted:

lmao

I think I found one of Wayne as a child,



can we make images thread titles

Adbot
ADBOT LOVES YOU

Wiggly Wayne DDS
Sep 11, 2010



Salt Fish posted:

I got you, I didn't know about google's crlsets or onecrl. I was really surprised to read that only 9% of TLS connections use OCSP stapling, I thought that was way more widely used.
their ocsp servers and routes can't handle the traffic (and it's a privacy nightmare) which is why we're reverting to that being optional and crls being required. i'm still a bit concerned on how browsers and other tls stacks deal with crls and replay attacks and that is something i should look into for prior research tbh

i'm still not sure how this helps given how big CRLs can be. they can be locally cached for a period of time so it's a significant reduction in per-connection traffic to instead put a higher cost on the initial connection and increases the period for revocation to be noticed by all clients

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

:golfclap:

Guy Axlerod
Dec 29, 2008

spankmeister posted:

no, that's not what I mean. I know what revocation is but that's something the CA does by putting the certs on the CRL (or OCSP).

no what I mean is the browser vendors implementing their own CRL on which the misbehaving CA's misissued certificates can be placed. (instead of just distrusting the entire CA (or subCA))

Would that still depend on the CA to self-report the certs in question? I think they would continue to not open incidents. I think Wayne found more certs that were not reported, but that was because they were next to others that were reported.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

ugh, I guess I have to post to clarify what I meant about picking CAs that don’t suck. mdsp is probably better for that than the bug…

Salt Fish
Sep 11, 2003

Cybernetic Crumb

Wiggly Wayne DDS posted:

their ocsp servers and routes can't handle the traffic (and it's a privacy nightmare) which is why we're reverting to that being optional and crls being required. i'm still a bit concerned on how browsers and other tls stacks deal with crls and replay attacks and that is something i should look into for prior research tbh

i'm still not sure how this helps given how big CRLs can be. they can be locally cached for a period of time so it's a significant reduction in per-connection traffic to instead put a higher cost on the initial connection and increases the period for revocation to be noticed by all clients

I thought that's what stapling solves. You cache the signed OCSP response on your server and then serve that along with your certificate to prove to the client your cert hasn't been revoked, therefore removing the privacy issue (only the server you sent the request to knows its you) and also the load issue. I have only run into OCSP professionally maybe 2-3x for support issues that clients had with setting up stapling on the web hosting side, so I have essentially no knowledge of what would even drive adoption except the good will of server operators.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

yeah, OCSP stapling was supposed to solve the load issues, like 15 years ago

Salt Fish
Sep 11, 2003

Cybernetic Crumb
From my experience in fully managed web hosting that somehow includes SEO assistance, you just need all search engines to make a rule that you can't be on the first page of results unless you support stapling and it would be universally adopted in a month.

edit this stuff should not be 1% as interesting as it is lol

Grace Baiting
Jul 20, 2012

Audi famam illius;
Cucurrit quaeque
Tetigit destruens.



digitalist posted:

lmao

I think I found one of Wayne as a child,



that is julie uhrman erasure

SeaborneClink
Aug 27, 2010

MAWP... MAWP!
Entrust politely asked us to rotate certs when it was convenient for us to do so, there was zero urgency to it.

Is it any wonder people are dragging their feet on it?

:ohdear: I hope people aren't replacing entrust certs with entrust certs since it's taken so long to even get this far.

Lotta companies gonna end up doing surprised pikachu faces if/when Entrust gets yanked from the roots and suddenly a leisurely cert replacement is gonna turn into an emergency.

:sickos:

Raymond T. Racing
Jun 11, 2019

SeaborneClink posted:

Entrust politely asked us to rotate certs when it was convenient for us to do so, there was zero urgency to it.

Is it any wonder people are dragging their feet on it?

:ohdear: I hope people aren't replacing entrust certs with entrust certs since it's taken so long to even get this far.

Lotta companies gonna end up doing surprised pikachu faces if/when Entrust gets yanked from the roots and suddenly a leisurely cert replacement is gonna turn into an emergency.

:sickos:

wait are you saying you received a request to rotate and they never mentioned at all that they were under contractual obligation to revoke within 5 days? :sickos:

I feel like this is a much bigger concern: they're straight up avoiding mentioning the violation of 4.9.1.1 if that's the case?

Raymond T. Racing fucked around with this message at 21:32 on May 15, 2024

SeaborneClink
Aug 27, 2010

MAWP... MAWP!

Raymond T. Racing posted:

wait are you saying you received a request to rotate and they never mentioned at all that they were under contractual obligation to revoke within 5 days? :sickos:

I feel like this is a much bigger concern: they're straight up avoiding mentioning the violation of 4.9.1.1 if that's the case?

Why the gently caress would they say that, if they themselves didn't believe they were under an obligation to revoke in the first place :thunk:

Wiggly Wayne DDS
Sep 11, 2010



i know for cpsuri they sent out this email:



then subsequently did gently caress all. note they want the customers to go onto the online portal and request a reissue and revoke within -30- days....

Raymond T. Racing
Jun 11, 2019

Wiggly Wayne DDS posted:

i know for cpsuri they sent out this email:



then subsequently did gently caress all. note they want the customers to go onto the online portal and request a reissue and revoke within -30- days....

"pretty please revoke"

not "we have revoked them for you please go to entrust dot bad slash new cert and submit a new CSR"

:thunk:

Raymond T. Racing
Jun 11, 2019

also oh my god, they're charging 219/yr (at one year pricing) for a single example.com/www.example.com OV cert, with a single extra SAN costing 79

their one year wildcard OV (*.example.com) is 799 and you can't add additional wildcard subdomains I can't tell if the calculator can't handle additional wildcards or if the price for adding another wildcard in there is 10 SANs

this is a loving racket

eta:



Raymond T. Racing fucked around with this message at 23:38 on May 15, 2024

infernal machines
Oct 11, 2012

we monitor many frequencies. we listen always. came a voice, out of the babel of tongues, speaking to us. it played us a mighty dub.
sure but consider the incredible value organizational validation provides

Raymond T. Racing
Jun 11, 2019

infernal machines posted:

sure but consider the incredible value organizational validation provides

like

and


?

NoneMoreNegative
Jul 20, 2000
GOTH FASCISTIC
PAIN
MASTER




shit wizard dad


:eyepop: they know

infernal machines
Oct 11, 2012

we monitor many frequencies. we listen always. came a voice, out of the babel of tongues, speaking to us. it played us a mighty dub.

:thejoke:

your customers may not appreciate it or even be aware of its existence, but you'll know

Storysmith
Dec 31, 2006

Wiggly Wayne DDS posted:

note they want the customers to go onto the online portal and request a reissue and revoke within -30- days....

to clarify, the email does communicate the date at which it will be revoked and that they will need to reissue within that deadline as well, but "revoke within 30 days" is still a terrible string to have in the body of an email that most customers are going to glance at, at best.

the problem is that within the reissue flow for a cert, there is a button you have to press which means "i assert that i will soon no longer be using the previous issuance of this cert and it is good to revoke". that button is poorly named, but basically means "when you press this button, we are reissuing this cert now and giving you a period of time of up to 30 days to rotate it before we revoke the old one"

Wiggly Wayne DDS
Sep 11, 2010



Storysmith posted:

to clarify, the email does communicate the date at which it will be revoked and that they will need to reissue within that deadline as well, but "revoke within 30 days" is still a terrible string to have in the body of an email that most customers are going to glance at, at best.

the problem is that within the reissue flow for a cert, there is a button you have to press which means "i assert that i will soon no longer be using the previous issuance of this cert and it is good to revoke". that button is poorly named, but basically means "when you press this button, we are reissuing this cert now and giving you a period of time of up to 30 days to rotate it before we revoke the old one"
lol, but also that's for entrust to explain. i should ask for them to include their general correspondence for all the issues sent to subscribers in their ""report""

SIGSEGV
Nov 4, 2010


If this winds up with the BR prescribing some boilerplate that must be, no matter what, included in revocation notifications...



Actually this would probably be a good thing, along with standardized translations, cutting down on excuses and work for everyone once it's done and it will never change. In 2200, the computer touchers will need to speak Chinese and ancient English and by god they will cry every day.

Storysmith
Dec 31, 2006

SIGSEGV posted:

If this winds up with the BR prescribing some boilerplate that must be, no matter what, included in revocation notifications...



Actually this would probably be a good thing, along with standardized translations, cutting down on excuses and work for everyone once it's done and it will never change. In 2200, the computer touchers will need to speak Chinese and ancient English and by god they will cry every day.

if the language used is sufficiently standardised it essentially becomes a human-operated ACME ARI

Raymond T. Racing
Jun 11, 2019

Storysmith posted:

if the language used is sufficiently standardised it essentially becomes a human-operated ACME ARI

I don’t entirely think this is what our friends at entrust had in mind

spankmeister
Jun 15, 2008






SIGSEGV posted:

If this winds up with the BR prescribing some boilerplate that must be, no matter what, included in revocation notifications...



Actually this would probably be a good thing, along with standardized translations, cutting down on excuses and work for everyone once it's done and it will never change. In 2200, the computer touchers will need to speak Chinese and ancient English and by god they will cry every day.

buddy, we're already speaking ancient English

Storysmith
Dec 31, 2006

https://www.abc.net.au/news/2024-05-16/health-organisation-part-of-large-scale-ransomware-data-breach/103856582

quote:

The ABC can confirm e-script provider MediSecure is the health organisation at the centre of the large-scale ransomware data breach announced by the National Cyber Security Coordinator on Thursday.

MediSecure's website has been pulled, and the company has posted a statement saying it has identified a cyber security incident impacting "the personal and health information of individuals".

The company is a prescription exchange service, which facilitates electronic prescribing and dispensing of prescriptions.

It says it has "taken immediate steps to mitigate any potential impact on our systems", and believes the incident originated from a third-party vendor.

"MediSecure takes its legal and ethical obligations seriously and appreciates this information will be of concern.

"MediSecure is actively assisting the Australian Digital Health Agency and the National Cyber Security Coordinator to manage the impacts of the incident."

from their site:

quote:


MediSecure has identified a cyber security incident impacting the personal and health information of individuals. We have taken immediate steps to mitigate any potential impact on our systems.

While we continue to gather more information, early indicators suggest the incident originated from one of our third-party vendors.

MediSecure takes its legal and ethical obligations seriously and appreciate this information will be of concern. MediSecure is actively assisting the Australian Digital Health Agency and the National Cyber Security Coordinator to manage the impacts of the incident. MediSecure has also notified the Office of the Australian Information Commissioner and other key regulators.

MediSecure understands the importance of transparency and will provide further updates via our website as soon as more information becomes available. We appreciate your patience and understanding during this time.

i sure would love just a smidgen more detail about the status of the broker holding names, addresses, prescription lists, and tokens that let you dispense drugs from pharmacies

Wiggly Wayne DDS
Sep 11, 2010



Wiggly Wayne DDS posted:

the latest entrust update have claimed subscriber reasons. have a seat and don't drink. this incident has been ongoing since earlier March and subscribers were notified March 20th

2024-05-15 15:33: Entrust: Delayed revocation of clientAuth TLS Certificates without serverAuth EKU

Paul (Entrust) posts the following:

and yet for the cpsuri incident they're incapable of doing that bare minimum: 2024-05-16 03:02:
Entrust: Delayed revocation of EV TLS certificates with missing cPSuri

Bruce (Entrust) posted:

We are working diligently with our customers to complete revocation of affected certificates. Over 95% of customers have completed revocation. We have 9,906 certificates remaining within the following four (4) industries: Financial Institutions (6,940 certificates), Government Agencies (170 certificates), Information Technology (46 certificates), and Travel (Airline) (2,750 certificates). All are scheduled to be revoked within the next 20 days with limited exceptions as required.

Sir Bobert Fishbone
Jan 16, 2006

Beebort

Wiggly Wayne DDS posted:

and yet for the cpsuri incident they're incapable of doing that bare minimum: 2024-05-16 03:02:
Entrust: Delayed revocation of EV TLS certificates with missing cPSuri

"limited exceptions" doin a lot of work in that sentence

Wiggly Wayne DDS
Sep 11, 2010



these were all supposed to be dealt within 5 days of entrust finding out they had an issue

Sir Bobert Fishbone
Jan 16, 2006

Beebort

Wiggly Wayne DDS posted:

these were all supposed to be dealt within 5 days of entrust finding out they had an issue

tbf to them they still seem to be struggling to recognize that they have an issue

Shame Boy
Mar 2, 2010

Sir Bobert Fishbone posted:

tbf to them they still seem to be struggling to recognize that they have an issue

i've been at companies on the other end of "our company has done a bad thing, but we don't think it's all that bad, but other people sure do" plenty of times before and i think i can imagine precisely how management is addressing this internally, cuz their responses look like the same exact bullshit excuses and ignoring the problem or being distracted until someone escalates, etc. it's really funny to watch it from the other side for once.

Raymond T. Racing
Jun 11, 2019

they’re gonna love putting together per subscriber reasons for 9,000 certs

atriptothebeach
Oct 27, 2020

a billion dollars a year

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...
"please let <customer> know that either you will revoke their certs, or we will revoke both yours and thus theirs."

hellotoothpaste
Dec 21, 2006

I dare you to call it a perm again..

Raymond T. Racing posted:

also oh my god, they're charging 219/yr (at one year pricing) for a single example.com/www.example.com OV cert, with a single extra SAN costing 79

their one year wildcard OV (*.example.com) is 799 and you can't add additional wildcard subdomains I can't tell if the calculator can't handle additional wildcards or if the price for adding another wildcard in there is 10 SANs

this is a loving racket

eta:





I bought a cert through Azure by way of GoDaddy once, not knowing I didn’t have to pay this much to acquire a wildcard cert. Was even more expensive, would have been pissed but it was paid for in free credits so 🤷‍♂️

hellotoothpaste
Dec 21, 2006

I dare you to call it a perm again..

I have a dumb question probably. How is it that a lot of the incident reports are related to poo poo like “country code was lowercase” and all sorts of inane-sounding data quality issues? Genuinely curious and coming from blockchain so no answer will surprise me.

Raymond T. Racing
Jun 11, 2019

hellotoothpaste posted:

I have a dumb question probably. How is it that a lot of the incident reports are related to poo poo like “country code was lowercase” and all sorts of inane-sounding data quality issues? Genuinely curious and coming from blockchain so no answer will surprise me.
so there’s a few things at play here:

1. incidents are (generally) not a bad thing. in theory it should allow for the ecosystem as a whole to be stronger
2. for the country code thing, one spec was written by lawyers, one spec was written by engineers

lawyers: "the country code must match what is defined for country. US = us"
engineers: "MUST SHALL etc to be treated as RFC2119. country code in cert MUST match country code as defined in blah blah blah. US != us"

Raymond T. Racing fucked around with this message at 16:43 on May 16, 2024

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
there's a general (probably well-founded) assumption that how you react to these "the cert is wrong in a way that doesn't really materially impact anything" events is going to be the same way you react to actual security-impacting issues. showing that you can respond appropriately and churn your certificates in a timely fashion is a good sign, especially if you can also write up some nice lessons learned and make process adjustments to avoid running into the same issues repeatedly.

in contrast, if you show in one of these events that you are organizationally incapable of revoking and replacing certs in a timely fashion, that does not give anyone confidence that you'll be able to do so in an event where it's actually important for web security to revoke and replace certs. doubly so if you write up some nice "lessons learned" and then completely fail to actually learn any of the lessons you listed.

Raymond T. Racing
Jun 11, 2019

Jabor posted:

there's a general (probably well-founded) assumption that how you react to these "the cert is wrong in a way that doesn't really materially impact anything" events is going to be the same way you react to actual security-impacting issues. showing that you can respond appropriately and churn your certificates in a timely fashion is a good sign, especially if you can also write up some nice lessons learned and make process adjustments to avoid running into the same issues repeatedly.

in contrast, if you show in one of these events that you are organizationally incapable of revoking and replacing certs in a timely fashion, that does not give anyone confidence that you'll be able to do so in an event where it's actually important for web security to revoke and replace certs. doubly so if you write up some nice "lessons learned" and then completely fail to actually learn any of the lessons you listed.

especially when you previously commit to not making these mistakes again, and especially not failing to revoke for an intended period of time

then you do the exact same thing

Adbot
ADBOT LOVES YOU

Wiggly Wayne DDS
Sep 11, 2010



i disagree on the lawyer v engineer argument on iso 3166 (the standards body is absurdly consistent on its usage in practice), but it's mainly simple data quality issues that are being brought up lately as that's where i started looking. start with the inane stuff that should be easy to surface across any CA for conformity and then work on the more complex cases

at the rate things are going e-commerce monitoring gmbh is going to be distrusted before entrust even puts together their report

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply