Yearly Archives: 2015


Gogo Serving Fake SSL Certificates to Block Streaming Sites

PC Magazine has the article and video Gogo Serving Fake SSL Certificates to Block Streaming Sites.

Mile-high Web provider Gogo appears to be running man-in-the-middle attacks on its own customers.

Based on a report by Google engineer Adrienne Porter Felt, Gogo Inflight Internet is serving SSL certificates from Gogo instead of site providers—a big no-no in online security.

Will someone please explain to me why this isn’t one of the biggest security flaws in the entire design of the secure sockets layer of internet data transport?  Surely people who designed and implemented the system considered this form of attack, didn’t they?  Surely PC magazine could explain how to protect yourself from this, can’t they?

If GoGo can do this, who is to say who else might not try this?

I cannot even comprehend how the security expert who discovered this could calmly say “serving SSL certificates from Gogo instead of site providers—a big no-no in online security.”  How could a security expert conceive of a secure system whose security depended on people not cheating?  I thought the whole point of security was to stop people from cheating.  If you design a system to stop people from cheating that depends on people not cheating, then you must be a fool.

Now, let me step back and try to consider this rationally.  If you follow the links in the article, you will eventually see what the discoverer of this fakery saw.

Indication of security problem

If you look at the, you will see it say “This certificate was singed by an untrusted issuer.”  The lesson learned is to never trust an untrusted issuer, duh!  However, I have to ask that if every browser is automatically set up to boldly issue such a warning, why haven’t millions of people in the flying public been screaming about this already?  Even if most people wouldn’t know what to do with such a message, there must be enough techies flying the friendly skies that many of them would have complained about this before.  I am definitely going to research this issue more.  This looks like a big, honking hole in internet security.

Some people wonder why we refuse to fly since I have retired.  Add this one to the list of reasons.

I would only be flying for pleasure, anyway.  So the risk to me is that I might “only” be giving away access to all my financial and health data.  Think about all the business travelers who are compromising their companies’ secret information while all along they think they are protecting it.


CertificateTransparency.org has the article What is Certificate Transparency?  They first explain the issue:

Thanks to modern cryptography, browsers can usually detect malicious websites that are provisioned with forged or fake SSL certificates. However, current cryptographic mechanisms aren’t so good at detecting malicious websites if they’re provisioned with mistakenly issued certificates or certificates that have been issued by a certificate authority (CA) that’s been compromised or gone rogue.

They prescribe certificate transparency as the solution.  Read about it, and see if you feel any safer.  Obviously this flaw is well known to anybody who wants to cheat the system.

ZDnet published the article How the NSA, and your boss, can intercept and break SSL in June 2013..

Blue Coat, the biggest name in the SSL interception business, is far from the only one offering SSL interception and breaking in a box.

If the punctuation of that quote is misleading, let me reword it slightly.  For a fee, you can buy an SSL interception application without the need to know anything about how that application accomplishes the feat.  That’s not even the most disturbing part of what is in the article.

As I think about the description of the interception in the above article, I wonder how GoGo could have been so sloppy that it allowed the browser to detect that ““This certificate was singed by an untrusted issuer.”  The only thing I can guess is that the Google engineer who detected this had independent means of checking the authenticity of the certificate that purported to come from YouTube (which is owned by Google.)


January 12, 2015

The Hacker News has the article New Firefox 32 Adds Protection Against MiTM Attack and Rogue Certificates. I am still not convinced.

Stackexchange has the Q & A How do RSA fingerprints protect from MITM attacks?

I posed the following questions to that Q & A:

What about a Man in the middle attack that fakes the public key and the fingerprint of the secure server. In other words, the MITM gives you a public key to use that it has the private key for. It then forwards your message on to the actual recipient by re-encoding your decrypted message with the real public key. It does the same fakery for the message coming back from the secure server.

How do you really know that the public key you are getting is the actual public key of the server you intended to talk to? Yes their are certificate authorities, but if the MITM can fake the public key of your intended target, why can’t it fake what you get from the certificate authority?

I am still not entirely convinced. All the methods that I have read about a secure exchange of information to ensure a secure exchange of information all seem circular to me. If you could have a secure exchange of information to set up a secure exchange of information, then why couldn’t that method be your method of secure exchange? Adding more layers to the protocol may increase the number of things the MITM attacker has to fake, but it is nowhere near the size of the mathematical difficulty that adding more binary bits to the code would present if you could only know for sure that you had a valid public key.


Dress For Success

For those complaining about how hot it is in Florida this January, I offer some examples of how we are dressing in Sturbridge to go out and get our newspapers from the end of the driveway.

Just returning from retrieving the newspaper
Just retrieved the newspaper

Who is that behind the mask?
Closeup of my face?


At 10 degree and some wind, I took the advice of the weather people, and took some extra precautions.


Elizabeth Warren Delivers Scathing Speech On Trickle-Down Economics

Talking Points Memo has the article Elizabeth Warren Delivers Scathing Speech On Trickle-Down Economics.

“Pretty much the whole Republican Party – and, if we’re going to be honest, too many Democrats – talked about the evils of ‘big government’ and called for deregulation,” Warren continued.
.
.
.
“The trickle-down experiment that began in the Reagan years failed America’s middle class,” Warren said. “Sure, the rich are doing great. Giant corporations are doing great. Lobbyists are doing great. But we need an economy where everyone else who works hard gets a shot at doing great!”

If you want a nice poster on this topic, see my previous post The Lesson Of The Current Economic Boom.

Among the too many Democrats you could include President Obama and both Clintons, Bill and Hillary.  Yet, somehow there are still Democrats who are pining fir Hillary Clinton to run for President.  What would it take to get them to wake up?  I keep trying everything I know to get them to see the reality.


January 7, 2015

See my subsequent post Sen. Elizabeth Warren at the AFL-CIO Raising Wages Summit to see the video of the speech.


Guest: Travel writer Rick Steves warns that corporate profiteering comes with a price

The Seattle Times has the article Guest: Travel writer Rick Steves warns that corporate profiteering comes with a price.

Maybe there is a crisis in this country — just not the one we keep hearing about. In reality, perhaps it’s a crisis of distribution within the vast and growing American economic pie. Or a crisis between our huge pie and the billions of desperately poor people elsewhere on our planet. What’s our response? A contemporary version of “Let them eat cake.”

Who knew that Rick Steves was far more than “just” a travel writer?  Given the history that he tells in this article, the inevitable outcome of our current situation does not look good for the shortened 1%.

Thanks to Summer Starbuck for posting this on her Facebook page.


New GOP Congress Fires Shot At Social Security On Day One

Talking Points Memo has the article New GOP Congress Fires Shot At Social Security On Day One.

With a little-noticed proposal, Republicans took aim at Social Security on the very first day of the 114th Congress.

The incoming GOP majority approved late Tuesday a new rule that experts say could provoke an unprecedented crisis that conservatives could use as leverage in upcoming debates over entitlement reform.

The largely overlooked change puts a new restriction on the routine transfer of tax revenues between the traditional Social Security retirement trust fund and the Social Security disability program. The transfers, known as reallocation, had historically been routine; the liberal Center for Budget and Policy Priorities said Tuesday that they had been made 11 times. The CBPP added that the disability insurance program “isn’t broken,” but the program has been strained by demographic trends that the reallocations are intended to address.

The House GOP’s rule change would still allow for a reallocation from the retirement fund to shore up the disability fund — but only if an accompanying proposal “improves the overall financial health of the combined Social Security Trust Funds,” per the rule, expected to be passed on Tuesday. While that language is vague, experts say it would likely mean any reallocation would have to be balanced by new revenues or benefit cuts.

I don’t know why anybody is surprised that the House GOP would waste even a  single day before attacking one of their favorite targets.  It is funny how Democratic run houses of Congress cannot find ways to get anything past the minority opposition, but Republican led houses seem to figure out sneaky ways to bend the rules that will force the minority to swallow whatever the majority wants.

Elizabeth Warren has posted her comments about this on her Facebook pages.


Bernie Sanders Flexes His Muscles By Introducing Bill To Create 13 Million New Jobs 1

Politicus USA has the article Bernie Sanders Flexes His Muscles By Introducing Bill To Create 13 Million New Jobs.

Sen. Bernie Sanders is using his new position as the top Democratic caucus member on the Senate Budget Committee to push a new bill that he will introduce to the new Congress that will create 13 million jobs by rebuilding the nation’s bridges and roads.

If Bernie Sanders can introduce a bill to create 13 million jobs from his minority position on the Senate Budget Committee, one has to wonder why no Democrat on that committee could have introduced such a bill when the Democrats were in the majority.


The Real Cause Of Low Oil Prices: Interview With Arthur Berman

Naked Capitalism has the article The Real Cause Of Low Oil Prices: Interview With Arthur Berman. Naked Capitalism introduces the article with the following comment:

Yves here. This is a terrific interview that you need to read pronto if you have any interest in the outlook for oil prices, understanding fracking economics, and the real reason for the push for Keystone XL pipeline. Berman is colorful, direct, and provides lots of granular detail.


It’s enough to make me wonder whether or not I should keep my oil investments. Maybe I am hedged enough because of my utilities.