Go Back   maemo.org - Talk > Devices > Nokia N900
 
Register FAQ Community Calendar Today's Posts Search

Reply
 
Thread Tools
  #1  
Old 2011-08-30, 14:14
PMaff's Avatar
PMaff PMaff is offline
 
Join Date: Sep 2010
Posts: 361
Thanks!: 232
Thanked 219 Times in 108 Posts
Default [SOLVED]Security: Fraudulent *.google.com Certificate

"Issue

Mozilla was informed today about the issuance of at least one fraudulent SSL certificate for public websites belonging to Google, Inc. This is not a Firefox-specific issue, and the certificate has now been revoked by its issuer, DigiNotar. This should protect most users.
..."
http://blog.mozilla.com/security/201...m-certificate/

and
http://www.h-online.com/open/news/it...s-1333088.html

Can we switch that off for our browsers (MicroB,Fennec, Opera)?
See also
http://support.mozilla.com/en-US/kb/...inotar-ca-cert
Certificate Manager (in Settings) only allows to import a certificate.
How do I delete one?

Last edited by PMaff; 2011-11-01 at 17:27.
Reply With Quote
  #2  
Old 2011-08-30, 14:26
freemangordon freemangordon is offline
 
Join Date: Mar 2010
Location: Sofia,Bulgaria
Posts: 3,074
Thanks!: 2,415
Thanked 12,959 Times in 2,522 Posts
Default Re: Security: Fraudulent *.google.com Certificate

Open a bug, seriously, there is a chance Nokia to react
Reply With Quote
The Following 3 Users Say Thank You to freemangordon For This Useful Post:
  #3  
Old 2011-08-30, 14:56
jd4200's Avatar
jd4200 jd4200 is offline
 
Join Date: Apr 2010
Location: England
Posts: 451
Thanks!: 177
Thanked 424 Times in 177 Posts
Default Re: Security: Fraudulent *.google.com Certificate

I manually deleted diginotars certificate on my laptop (as per mozilla's instructions), and then copied the cert8.db file from within the firefox directory to the phone.

Going to https://www.diginotar.com/ presented me with an invalid certificate, so it's working.

Edit: You could also use certutil to remove just the one certificate, you'll have to copy your cert8.db over to a computer that can run the certutil program, and the copy the database back over.

Last edited by jd4200; 2011-08-30 at 15:03.
Reply With Quote
  #4  
Old 2011-08-30, 15:07
NIN101 NIN101 is offline
 
Join Date: Dec 2010
Posts: 115
Thanks!: 34
Thanked 342 Times in 63 Posts
Default Re: Security: Fraudulent *.google.com Certificate

This is very important. And it seems there is no way to manage certificates on maemo, which is a shame. So yeah, as jd4200 said, simply delete the certificate on your computer, then copy the cert8.db to /home/user/.mozilla/microb/. Not sure how microb makes usage of OCSP.
Edit: better this http://talk.maemo.org/showpost.php?p...7&postcount=12 and http://talk.maemo.org/showpost.php?p...86&postcount=7

Anyway, it's an OS from October 2010. I bet there much much more security issues, probably even remote :-).

Last edited by NIN101; 2011-08-31 at 14:42.
Reply With Quote
  #5  
Old 2011-08-30, 15:12
PMaff's Avatar
PMaff PMaff is offline
 
Join Date: Sep 2010
Posts: 361
Thanks!: 232
Thanked 219 Times in 108 Posts
Default Re: Security: Fraudulent *.google.com Certificate

Quote:
Originally Posted by jd4200 View Post
I manually deleted diginotars certificate on my laptop (as per mozilla's instructions), and then copied the cert8.db file from within the firefox directory to the phone.

Going to https://www.diginotar.com/ presented me with an invalid certificate, so it's working.

Edit: You could also use certutil to remove just the one certificate, you'll have to copy your cert8.db over to a computer that can run the certutil program, and the copy the database back over.
I am not sure if cert8.db from another machine contains all the necessary certificates for N900.
It think this only helps for Fennec.

Anyway: I contacted a security email address at Nokia, let's see, if they answer.
Reply With Quote
The Following 3 Users Say Thank You to PMaff For This Useful Post:
  #6  
Old 2011-08-30, 15:18
NIN101 NIN101 is offline
 
Join Date: Dec 2010
Posts: 115
Thanks!: 34
Thanked 342 Times in 63 Posts
Default Re: Security: Fraudulent *.google.com Certificate

Quote:
I am not sure if cert8.db from another machine contains all the necessary certificates for N900.
These are just certs for microb. I don't see any problem here.

Anyway, OCSP in microb:
security.OCSP.enabled=1
security.OCSP.require=false

Which means AFAIK: "Contact an OCSP server if the certificate has one listed. If not, then do not. " "Also, if the connection to the OCSP server fails, do not think it is invalid/revoked."

But I would not rely on OCSP anyway. However, some people might want to change this.

Last edited by NIN101; 2011-08-30 at 15:25.
Reply With Quote
The Following 3 Users Say Thank You to NIN101 For This Useful Post:
  #7  
Old 2011-08-31, 08:01
Rob1n Rob1n is offline
 
Join Date: Nov 2009
Location: Cambridge, UK
Posts: 3,617
Thanks!: 769
Thanked 2,412 Times in 1,382 Posts
Default Re: Security: Fraudulent *.google.com Certificate

Quote:
Originally Posted by NIN101 View Post
This is very important. And it seems there is no way to manage certificates on maemo, which is a shame.
For microb, just point your browser to chrome://pippki/content/certManager.xul (I've set up a bookmark for this) to get access to the certificate management interface.
Reply With Quote
The Following 11 Users Say Thank You to Rob1n For This Useful Post:
  #8  
Old 2011-08-31, 11:50
vinc17 vinc17 is offline
 
Join Date: Feb 2008
Location: Lyon, France
Posts: 227
Thanks!: 66
Thanked 53 Times in 35 Posts
Default Re: Security: Fraudulent *.google.com Certificate

Quote:
Originally Posted by Rob1n View Post
For microb, just point your browser to chrome://pippki/content/certManager.xul (I've set up a bookmark for this) to get access to the certificate management interface.
After trying to remove the DigiNotar root CA certificate with this, https no longer works at all! I just get a blank window for any https URL I try. It seems that the browser still tries to connect...
Reply With Quote
  #9  
Old 2011-08-31, 12:20
Rob1n Rob1n is offline
 
Join Date: Nov 2009
Location: Cambridge, UK
Posts: 3,617
Thanks!: 769
Thanked 2,412 Times in 1,382 Posts
Default Re: Security: Fraudulent *.google.com Certificate

Quote:
Originally Posted by vinc17 View Post
After trying to remove the DigiNotar root CA certificate with this, https no longer works at all! I just get a blank window for any https URL I try. It seems that the browser still tries to connect...
No idea how that's happened - it won't actually let you remove the certificate anyway (it appears to work, but re-opening the certificate manager shows it back again).
Reply With Quote
  #10  
Old 2011-08-31, 12:42
vinc17 vinc17 is offline
 
Join Date: Feb 2008
Location: Lyon, France
Posts: 227
Thanks!: 66
Thanked 53 Times in 35 Posts
Default Re: Security: Fraudulent *.google.com Certificate

Quote:
Originally Posted by Rob1n View Post
No idea how that's happened - it won't actually let you remove the certificate anyway (it appears to work, but re-opening the certificate manager shows it back again).
Yes, I noticed that. That's why I removed the certificate 8868bfe08e35c43b386b62f7283b8481c80cd74d.pem manually from /etc/certs/common-ca and the corresponding symlink (c0cafbd2.0).

Actually the browser (the backend) crashes (the coredump has been uploaded by the crash reporter). This explains why the UI remains in the same state.
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT. The time now is 20:16.