Nmap Development mailing list archives
Superfish support for ssl-known-key?
From: David Fifield <david () bamsoftware com>
Date: Thu, 19 Feb 2015 09:27:58 -0800
There's this story about how lots of computers have a trusted root CA with a known private key. http://arstechnica.com/security/2015/02/lenovo-pcs-ship-with-man-in-the-middle-adware-that-breaks-https-connections/ It seems like the kind of thing we should detect in ssl-known-key.nse. http://nmap.org/nsedoc/scripts/ssl-known-key However, if I understand correctly, we have to change ssl-known-key a bit for it to work. Superfish will be the issuer certificate, not a leaf certificate. It means we want to check every certificate in the chain, not only the leaf. Robert Graham says this is the key: http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html https://github.com/robertdavidgraham/pemcrack/blob/master/test.pem If so, then this is its fingerprint: $ openssl x509 -noout -fingerprint -in test.pem SHA1 Fingerprint=C8:64:48:48:69:D4:1D:2B:0D:32:31:9C:5A:62:F9:31:5A:AF:2C:BD David Fifield _______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Superfish support for ssl-known-key? David Fifield (Feb 19)
- Re: Superfish support for ssl-known-key? Daniel Miller (Feb 19)
- Re: Superfish support for ssl-known-key? David Fifield (Feb 19)
- Re: Superfish support for ssl-known-key? Daniel Miller (Feb 19)
- Re: Superfish support for ssl-known-key? David Fifield (Feb 19)
- Re: Superfish support for ssl-known-key? Daniel Miller (Feb 19)