Researchers have proposed an extension to the Internet's foundation of trust that's designed to root out fraudulent secure sockets layer (SSL) certificates before attackers can use them to impersonate online banks and other sensitive websites.
The proposal, which was submitted Wednesday to the Internet Engineering Task Force, is designed to mend a fundamental crack in the SSL system, which is also referred to by a successor protocol called TLS, or transport layer security. With some 650 entities around the world authorized to issue digital certificates trusted by Internet Explorer, Chrome, Firefox, and other browsers, all it takes is the incompetence or malfeasance of one of them to bring the system down. That single point of failure was underscored by last year's breach of certificate authority DigiNotar, which led to the issuance of a fraudulent credential used to snoop on 300,000 Google Mail users, most of whom were in Iran.
The lightweight extension, known as TACK or Trust Assertions for Certificate Keys, was devised by independent cryptographers Moxie Marlinspike and Trevor Perrin. The opt-in system works by allowing SSL sites to sign valid SSL certificates, the domain name, and an expiration date with a TACK key. Once an end user has visited the site a few times using a TACK-compatible browser, a "pin" for that site is activated on the user's computer. If the end user later encounters a forged certificate for that same site—as was the case when DigiNotar was breached—the browser will reject the session and return a warning to the user.
"In the TACK world, the only real role the certificate authority plays is in that first time you connect to a website, that first leap of faith you have to take," Marlinspike told Ars. "You can imagine that being a much easier problem to solve than every time you connect to a website validating that this is correct."
Like Google certificate pinning—only different
TACK is in some ways akin to a certificate-pinning mechanism Google has built into its Chrome browser. The feature attaches a static list of certificate authorities that are allowed to sign certificates for Google.com and a limited number of other domains. If a Chrome user is presented with a credential from a different authority, the session is blocked. It was this feature that led to the discovery of last year's fraudulent Gmail certificate in the first place. (Google engineers have submitted their own IETF proposal that in many ways resembles TACK.)