You are here:  Home > Certificates > Review Safety > 650 Organizations Last updated 30 Dec 2012   

650 Organizations world-wide can install X509 Certificates on your PC

The Internet has always needed to support secure communications, but the problem is how to do it? At the start of the Internet age, there was a plan to have a world-wide global directory based on a standard called X500, which grew out of the need of large organizations to communicate in a secure way (not just over a secure communications link, but knowing that you are sending and receiving to the right people).

The growth of the Internet effectively sidelined this effort. The apparent solution was to introduce a new standard called X509, which allows digital certificates to be issued from a number of authoritative servers (by Certificate Authorities or CA's) so that sender and recipient can sign and encrypt data and send it over an open network. Obviously, you don't want to do this every time you just want to buy something from a web site, so a specific class of certificate was introduced to do the encryption between your web browser and the server hosting the web site you are connected to. This class makes use of so-called SSL (secure sockets layer) certificates.

A recent project by the Electronic Frontier Foundation (EFF) to map the number of organizations that function as Certificate Authorities has shown that there are about 650 of them. Each of them can install a digital certificate on your PC and it might be done silently and without your knowledge.

The EFF has also discovered that one of these organizations, Verizon, has allowed another organization to compromise security (see the notable breaches link).

This has happened because responsibility for security has been effectively delegated by the web browser designers (for example Microsoft and Mozilla) to other organizations though the Certificate Authority structure. The EFF has concerns about the role and practices of these CA's (see the project link above). You cannot have delegation of this responsibility without appropriate checks and balances, accountability and oversight, but unfortunately this does not currently exist. The Financial crisis of 2007 and 2008 has also undermined trust in large organizations, and company governance (or lack of it) varies by Country.

As an example of the EFF's concern, some CA's produced certificates for the same IP Address 192.168.1.2, which is a reserved address under RFC 1918 by IANA (the Internet Assigned Numbers Authority). These certificates give the location of the original request as: Belgium, Switzerland, US and UK. In the UK example, the certificate is for the BAA (British Airports Authority) Pension Trust. The valid dates are from 06 Aug 2009 to 07 Aug 2010 and yet the Public Key only has a length of 1024 bits with a signature based on the SHA1 hash function. Although the hash is OK, the key length should be at least 2048 bits. The NIST (National Institute of Standards and Technology in the US) recommends 2048 bits after 31 Dec 2010 as the minimum key length. The other somewhat bizarre thing is that this certificate contains not only the above private address, but the public (and routable) IP Address of 77.76.108.82. A quick Whois lookup shows the following details (as of 30 Apr 2011):

Owner: Timico Limited
Address: Timico Limited Beacon Hill Park, Newark NG24 2TN Nottinghamshire UNITED KINGDOM
Country: GB
IP Address Range: 77.76.64.0 to 77.76.127.255

The problem here is that we have a certificate bound to a public IP Address instead of a meaningful domain name (and domains usually persist as long as a company exists, whilst IP Addresses will change over time as the domain owner changes Internet providers).

Another example that the EFF gives (and is worthy of note) is that some 6000 certificates were issued to unique and apparently valid names of Localhost, which again equates to the PC loopback address of 127.0.0.1. Obviously the validation procedures for these certificates were either not enforced or were non-existant. The CA's that issued such certificates included:

Cybertrust
Entrust
Equifax
Microsoft
Verisign

The EFF project has shone a light on the anarchic state as to how CA's issue certificates, which is normally hidden from public view until a notable breach occurs. If you want a good overview of the current state of the SSLiverse, as EFF has named it, start with their 27C3 talk (a PDF file) on the EFF project link above (and look out for the certificate issued to the Ministere de la Justice for ECommerce using an MD5 signature algorithm, which was cracked years ago, and the Extended Validation (EV) certificate which expires in 2012 and has a key length of 512 bits instead of the recommended 2048 bits).

AllIncontext Limited is registered in England, No 04624520. Registered office address: 12-14 High Street, Petersfield, Hampshire, GU32 3JG.

Valid XHTML 1.0 Strict   Valid CSS!