Web Browsers Drop Mysterious Company With Ties To US Military Contractor

'Washington Post: Major web browsers moved Wednesday to stop using a mysterious software company that certified websites were secure, three weeks after The Washington Post reported its connections to a U.S. military contractor. Mozilla's Firefox and Microsoft's Edge said they would stop trusting new certificates from TrustCor Systems that vouched for the legitimacy of sites reached by their users, capping weeks of online arguments among their technology experts, outside researchers and TrustCor, which said it had no ongoing ties of concern. Other tech companies are expected to follow suit. The Post reported on Nov. 8 that TrustCor's Panamanian registration records showed the same slate of officers, agents and partners as a spyware-maker identified this year as an affiliate of Arizona-based Packet Forensics, which has sold communication interception services to U.S. government agencies for more than a decade. One of those contracts listed the "place of performance" as Fort Meade, Md., the home of the National Security Agency and the Pentagon's Cyber Command. The case has put a new spotlight on the obscure systems of trust and checks that allow people to rely on the internet for most purposes. Browsers typically have more than a hundred authorities approved by default, including government-owned ones and small companies, to seamlessly attest that secure websites are what they purport to be. "Certificate Authorities have highly trusted roles in the internet ecosystem and it is unacceptable for a CA to be closely tied, through ownership and operation, to a company engaged in the distribution of malware," Mozilla's Kathleen Wilson wrote to a mailing list for browser security experts. "Trustcor's responses via their Vice President of CA operations further substantiates the factual basis for Mozilla's concerns."' -- source: https://tech.slashdot.org/story/22/12/01/2113209 Cheers, Peter -- Peter Reutemann Dept. of Computer Science University of Waikato, NZ Mobile +64 22 190 2375 https://www.cs.waikato.ac.nz/~fracpete/ http://www.data-mining.co.nz/

On Fri, 2 Dec 2022 15:43:04 +1300, Peter Reutemann quoted:
'"Certificate Authorities have highly trusted roles in the internet ecosystem ...'
The main problem is that, once a browser trusts a CA, it is effectively allowed to provide a certificate for *any* domain (even though it might not be supposed to). There have been rogue CAs in the past, providing forged certs for particular domains, or selling such certs to companies to allow them to snoop on encrypted traffic to those domains. I thought work was being done to restrict the scope of the domains for which a CA could provide certificates (e.g. just to particular TLDs, or just the TLD for one country), which would limit the damage that they can do. Seems this hasn’t happened yet.
participants (2)
-
Lawrence D'Oliveiro
-
Peter Reutemann