Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
How the 2011 hack of DigiNotar changed the Internet’s infrastructure (slate.com)
94 points by nayuki on Dec 25, 2016 | hide | past | favorite | 8 comments


There was so much more to this hack then what is described in this article. Google for Foxit, Diginotar and Black Tulip for the complete report. It is interesting to read how the intruders navigated the separate networks and got full RDP access to the 8 CA generator servers in the secure room.


For anyone else, this seems to be the report referenced: https://www.rijksoverheid.nl/binaries/rijksoverheid/document...


Which one covers the last detail the best?


On one side, the CA certificate network forces a different kind of trust than SSH certificates. With a CA cert, you trust the browser company, and (sometimes) distrust the host. With SSH, the choice is only whether or not you trust the host.

(Please note Windows uses a similar cert for RDP, with the same options to trust once, trust forever, or disconnect immediately.)

Certificate Transparency is almost a type of blockchain, where what's stored is a website's decryption key.


Minor nitpick/correction: certificates are public keys, not decryption keys. Also you can only encrypt with a public key and decrypt with a private key or sign with a private key and verify with a public key. In general the CA PKI is mainly for endpoint (mainly server) authentication, actual encryption typically uses symmetric keys.


In Windows, one can use a certificate signed by the internal enterprise CA for RDP. This means that if one trusts the enterprise CA (which is the case within an enterprise), all internal RDP connections are immediately verified without prompts.


To nitpick, OpenSSH does offer a CA-based approach as well. Perhaps not as commonly used as regular host and client keys, though.


the real Mr. robot




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: