The lesson learned is that malicious root certificates in the trusted root certificate list can seriously subvert web client security. In Windows, you can check your trusted root certificate list by typing "certmgr.msc" in the Run dialog to open the certificates manager. The "Trusted Root Certification Authorities" and "Third-Party Root Certification Authorities" folders together comprise the list of people your web browser ultimately trusts. You might want to check that out if you're suspicious.
This looks suspicious |
However, for SSL signing, browsers require that the certificate have the "ensures the identity of a remote computer" purpose. Double-click a certificate to see what it can do.
Uh oh. (Fortunately, I knowingly made this and I have its key.) |
You might be surprised who your browsers trust. (Though do be careful - don't just delete a bunch of RCA's because you don't recognize them. Research is important! Some RCA's are critical to the proper functioning of Windows, like the ones for Windows Update or Authenticode.)
No comments:
Post a Comment