comcast bad cert

gboyce at badbelly.com gboyce at badbelly.com
Sun Oct 5 11:46:44 EDT 2003


On 5 Oct 2003, eric wrote:

> hello, would somebody please explain (in general) to me what the
> following really means and how a cracker could use it to take advantage
> of my communications.  thanks for any pointers.
> 
> "bad certificate from pop3.comcast.net
> signature bad
> self-signed certificate in chain"

SSL Certificates perform two separate functions, authentication and 
encryption.

The encryption portion is still in effect.  Any comminucation between your 
e-mail client and the server you are talking to are encrypted, and not 
subject to eavesdropping.

The authentication portion is broken here.  An SSL certificate has a chain 
of authority.  A trusted source (Verisign or others) has provided a signed 
certificate to the company after confirming that they say who they say 
they are.

A self-signed certificate is a certificate that is signed by the company 
itself.  If you have the correct public certificate, then your 
communication is safe.  It's very hard to be sure that the certificate is 
the correct one, without just trusting that you downloaded the correct 
one.

The way that this can be taken advantage of is by someone doing a man in 
the middle attack.  For example, if your DNS points to the wrong server 
for smtp.comcast.net, then the server you hit instead could give you their 
cert, and create their own communication with the actual server.  You'd 
get the data you want, but the server that you're hitting gets to listen 
in on the whole conversation.

I said before that the communication between your client and the server 
you're talking to are encrypted.  This is true, but you have no way of 
knowing if the server you're talking to is the server you wanted to talk 
to.

--
Greg Boyce




More information about the Discuss mailing list