Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:
IPv6:
UpOrDown
Ping
MTR
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc & Sum

Misissued Certificates for 1.1.1.1 Threaten Internet TLS Risk

Image © Arstechnica
Security researchers warn of three misissued TLS certificates for Cloudflare's 1.1.1.1 DNS service, issued in May and disclosed this week, potentially enabling decryption of DNS-over-HTTPS traffic and impacting Cloudflare's WARP VPN.

Researchers in internet security are sounding the alarm after three TLS certificates were issued for 1.1.1.1, Cloudflare’s widely used DNS service, by a subordinate CA in the Fina chain. The certificates were issued in May but only came to light this week. If exploited, they could decrypt DNS-over-HTTPS queries and potentially affect services like WARP, Cloudflare’s VPN.

Issued by Fina RDC 2020, a subordinate to Fina Root CA, the chain is trusted by Microsoft’s Root Certificate Program. Microsoft said it would take immediate action, including revoking the certificates on its disallowed list. The statement did not explain how the misissuance went undetected for so long. Apple’s Safari trust list did not include Fina, making it less likely the certificates would be trusted on Apple devices.

Public disclosure happened on Wednesday via an online discussion forum post, and it is not publicly known who requested the credentials. Representatives from Fina did not respond to inquiries. Google and Mozilla stated that Chrome and Firefox have never trusted the certificates, so no user action is required. Microsoft Edge holds a small share of the browser market, magnifying the potential impact if trusted by other platforms.

Encryption experts warn that TLS certificates attach a public key to a domain; misissued certs could be used in man-in-the-middle attacks on DNS traffic, including DNS-over-HTTPS traffic to 1.1.1.1. If an attacker could redirect traffic via BGP hijacks or other routes, end users could be exposed to forged responses. Cloudflare’s WARP VPN could also be affected if the certificates are accepted by endpoints.

Observers say the incident highlights ongoing PKI weaknesses and the importance of transparency logs. While the three certs were publicized, they illustrate that misissuance can slip through, despite attempts at monitoring. The industry is likely to review subordinate CA practices and how major vendors validate certificates in the future.

 

Arstechnica

Notícias relacionadas

APIs Sob Ataque: Proteção da Confiança Digital
Serpro desenvolve IA nacional para frear LLMs estrangeiros
TIP Brasil e Unifique firmam parceria 5G regional
Anatel mapeará condições de Internet no ensino superior
Anatel pode executar garantias para migrar Oi
Desoneração de M2M/IoT não resolve tudo

O ISP.Tools sobrevive graças aos anúncios.

Considere desativar seu bloqueador de anúncios.
Prometemos não ser intrusivos.

Consentimento de cookies

Usamos cookies para melhorar sua experiência em nosso site.

Ao usar nosso site, você concorda com os cookies. Saiba mais sobre o site