CA Compromise MITM Attacks

Discussions center on how compromising certificate authorities enables man-in-the-middle attacks on HTTPS connections, including scenarios with governments, ISPs, or state actors, and mitigations like Certificate Transparency.

📉 Falling 0.4x Security
4,179
Comments
20
Years Active
5
Top Authors
#5103
Topic ID

Activity Over Time

2007
3
2008
29
2009
20
2010
65
2011
151
2012
122
2013
393
2014
364
2015
450
2016
347
2017
285
2018
270
2019
253
2020
291
2021
175
2022
228
2023
336
2024
178
2025
212
2026
7

Keywords

US AWS MITM PKI CNNIC DNS LE HTTPS PGP en.m certificate ca mitm cas cert certs certificates key trust compromised

Sample Comments

kevincox May 11, 2022 View on HN

It's worse. A compromise of any certificate authority will do this.

Jwarder Oct 29, 2019 View on HN

The attacker needs to generate a new cert that the client trusts. This is easy on a corporate network where you can force users to trust a private CA. Unlikely to happen with a US ISP, but possible if someone hacks the CA (eg DigiNotar) or the CA hands out unconstrained certificates to someone who acts badly (eg CNNIC).

croon May 19, 2017 View on HN

Sure, but if they've MITM:ed your trusted certs, aren't you already boned in so many ways?

HoLyVieR Jan 22, 2012 View on HN

The thing with certificate is that you have to trust that the certificate authorities won't sell (or give) fake certificate to ISP or government. If they do so, the ISP can MITM you.

jaggederest Sep 7, 2013 View on HN

You're thinking too small scale.Certificate Authorities are almost certainly compromised. Why bother with one at a time when you can just force the vendor to hand the keys to the castle over? Sign your own certs, MITM anyone you want.

doublerabbit Oct 16, 2023 View on HN

Yes, and with those scenarios if your root certificate has been maliciously modified https isn't going to save you either

tptacek Nov 12, 2015 View on HN

Yes: assume one of the thousands of CAs you trust has been compromised by NSA.

mangeletti Oct 20, 2015 View on HN

If I know Let's Encrypt's secrets, and I control your network, I can set up a valid certificate on my server and MitM you.

tjohns Dec 2, 2015 View on HN

Yes and no.At a basic level, yes, any CA can issue a certificate which can be used to launch a MITM attack. We trust that the CAs don't do this. If they're caught, the browser industry tends to revoke their CA status -- which is pretty bad for the CA's business model.That said, the CAs have been under increased scrutiny lately, and browsers are starting to build additional protections against this kind of thing:- Certificate pinning (HPKP) allows sites to restrict which c

chroma Oct 29, 2019 View on HN

Only if you have a cert that the browser trusts for that domain. If a CA was found to be illicitly minting certs, browsers and operating systems would untrust them. All their certs would stop working. Their business would be ruined.