scary certificate for www.update.microsoft.com
Ben Liddicott
ben at liddicott.com
Mon Jun 18 18:30:12 BST 2012
This is a website for issuing updates to Microsoft Windows. It is
verified by a chain terminating in a certificate Microsoft issued
themselves.
The SSL Chain of trust is for trusting previously unknown parties. For
the purposes of updating Windows, Microsoft are not an unknown party.
Nothing would be added by having Verisign validate the certificate.
Cheers,
Ben
On 18/06/2012 01:12, Tony Naggs wrote:
>
>
> On 17 June 2012 17:57, Roland Perry <lists at internetpolicyagency.com
> <mailto:lists at internetpolicyagency.com>> wrote:
>
> In article <4FDE04AF.5000903 at zen.co.uk
> <mailto:4FDE04AF.5000903 at zen.co.uk>>, Peter Fairbrother
> <zenadsl6186 at zen.co.uk <mailto:zenadsl6186 at zen.co.uk>> writes
>
> I think the browsers are looking to check the hostname in the
> requested URL matches the hostname in the certificate - and it
> doesn't, 65.55.25.59 != www.update.microsoft.com
> <http://www.update.microsoft.com>
>
> Both actions seem like perfectly good behaviour to me.
>
>
> As a "user" I'd expect the browser to connect the two concepts,
> it's not as if DNS hasn't been invented yet.
>
>
> Scary certificate test results for Microsoft's Update server SSL
> certificate - "Overall rating Zero":
>
> As assessed by
> https://www.ssllabs.com/ssltest/analyze.html?d=www.update.microsoft.com
>
> Several bad features get highlighted in red.
>
> Certificate Information
> Common names www.update.microsoft.com <http://www.update.microsoft.com>
> Alternative names -
> Prefix handling Not required for subdomains
> Valid from Thu May 31 04:36:05 UTC 2012
> Valid until Sat Aug 31 04:46:05 UTC 2013 (expires in 1 year and 2
> months)
> Key RSA / 2048 bits
> Signature algorithm SHA1withRSA
> Server Gated Cryptography No
> Weak key (Debian) No
> Issuer Microsoft Update Secure Server CA 1
> Next Issuer Microsoft Root Certificate Authority
> Chain length (size) 2 (3241 bytes)
> Chain issues Incomplete
> Extended Validation No
> Revocation information CRL
> Revocation status Unchecked (only trusted certificates can be checked)
> Trusted No NOT TRUSTED (Why?)
>
>
> Protocols
> TLS 1.2 No
> TLS 1.1 No
> TLS 1.0 Yes
> SSL 3.0 Yes
> SSL 2.0+ upgrade support Yes
> SSL 2.0 INSECURE Yes
>
>
> Cipher Suites (SSLv3+ suites in server-preferred order, then SSLv2
> suites where used)
> TLS_RSA_WITH_AES_128_CBC_SHA (0x2f) 128
> TLS_RSA_WITH_AES_256_CBC_SHA (0x35) 256
> TLS_RSA_WITH_RC4_128_SHA (0x5) 128
> TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa) 168
> TLS_RSA_WITH_RC4_128_MD5 (0x4) 128
> SSL_DES_192_EDE3_CBC_WITH_MD5 (0x700c0) 168
> SSL_RC4_128_WITH_MD5 (0x10080) 128
>
>
> Miscellaneous
> Test date Sun Jun 17 22:52:25 UTC 2012
> Test duration 22.40 seconds
> Server signature Microsoft-IIS/7.0
> Server hostname -
> Session resumption No (IDs assigned but not accepted)
> BEAST attack Vulnerable INSECURE (more info)
> Secure Renegotiation Supported, with client-initiated
> renegotiation disabled
> Insecure Renegotiation Not supported
> Strict Transport Security No
> TLS version tolerance 0x0304: 0x301; 0x0399: 0x301; 0x0499: 0x301
> PCI compliant No
> FIPS-ready No
> Ephemeral DH Not seen
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.chiark.greenend.org.uk/pipermail/ukcrypto/attachments/20120618/8c91b41b/attachment.html>
More information about the ukcrypto
mailing list