Verification of the NNTP Server's SSL Certificate

Want something added? Ask for it here.
Post Reply
pirx
Newbie
Newbie
Posts: 3
Joined: January 15th, 2009, 6:06 am

Verification of the NNTP Server's SSL Certificate

Post by pirx »

It would be a very nifty to add the possibility to check the certification of the NNTP Server when communicating via SSL.
As you know, encryption without verification of the X.509 certificate doesn't secure you from man-in-the-middle attacks.

AFAIK, PyOpenSSL provides methods to verify certificates, so it shouldn't be that hard to implement it.
My suggestion is to add a per server configuration option for a certificate obtained from the server (e.g.
by saving it from firefox). When the verification fails, nothing should be downloaded.
User avatar
shypike
Administrator
Administrator
Posts: 19773
Joined: January 18th, 2008, 12:49 pm

Re: Verification of the NNTP Server's SSL Certificate

Post by shypike »

You assume that all providers have valid certificates?
BTW the intention of SSL for NNTP is:
- Prevent sending passwords in the clear
- Prevent traffic shaping by ISP

Our intention was to provide encryption and not authentication.
I'm not sure it's actually worth the effort to cover authentication as well.
Not to mention endless support questions on issues with this.
pirx
Newbie
Newbie
Posts: 3
Joined: January 15th, 2009, 6:06 am

Re: Verification of the NNTP Server's SSL Certificate

Post by pirx »

Thanx for your quick response.

Certificate verification could be optional, of course (so, only when provided).

IMHO encryption without authentication is a somewhat half-hearted solution suggesting
security where an important part in the chain is missing.
I guess, quite some NTTP over SSL users also hope to have security against content inspection.
Man-in-the-middle scenarios are not that uncommon, especially
when you have control of the domain name resolution facitilities (e.g. in intranets)
But please, dont get me wrong, I'm happy that there is actually SSL support and like
your well crafted software quite well.

I agree on potential support issues (as any new features might have).

After all, it was only a feature suggestion to make sabnzbd+ even more outstanding ;-)
User avatar
shypike
Administrator
Administrator
Posts: 19773
Joined: January 18th, 2008, 12:49 pm

Re: Verification of the NNTP Server's SSL Certificate

Post by shypike »

For an expert view on the value of authenticated SSL certificates,
see Bruce Schneier's newsletter.

Look for "Forging SSL Certificates" in:
http://www.schneier.com/crypto-gram-0901.html
But SSL doesn't provide much in the way of security, so breaking it doesn't harm security very much.
Pretty much no one ever verifies SSL certificates, so there's not much attack value in being able to forge them.
I'm not sure I agree completely with him, but he's is a respected specialist in this area.
pirx
Newbie
Newbie
Posts: 3
Joined: January 15th, 2009, 6:06 am

Re: Verification of the NNTP Server's SSL Certificate

Post by pirx »

Yes, I know Bruce Schneier, but I think your quote doesnt fit properly to our discussion here.

The quote simply states that *forging* an SSL certificate (as in the latest attack on MD5 signed certificates
of RapidSSL) is not worth the effort because not many client verifies them. So, its a problem
of the clients not verifying certificates, because if they would, security would be much increased,
and *then* forging an SSL certificate would have some value.

So, first the clients needs to support SSL certificate verification, before an attacker tries to break
the certificate ;-) Without certificate support there is of course no need to forge a certificate.

IMO this is, what Bruce wanted to state.
Post Reply