Safari, Mac OS X and Fraudulent SSL Certificates (Comodo)
Attackers were able to obtain SSL certificates for these domains, essentially allowing them to pose as those websites. The certificates have since been revoked by Comodo, however this relies on browsers checking for them by checking Comodo’s Certificate Revocation List (CRL) and having the Online Certificate Status Protocol (OCSP) enabled. Firefox and Chrome were updated last week to block the fraudulent certs, but Safari doesn’t do CRL and OCSP checking by default.
Hit the jump for how to enable these checks in OSX and Safari.
Intego have a blog post which details how to enable these settings in Mac OS X’s Keychain Access application, which manages certificates. Here is a summary on enabling it:
- Open Keychain Access (in /Application/Utilities)
- In the menu, select: Keychain Access > Preferences
- Click on the Certificates tab
- Set OCSP and CRL dropdowns to: Best Attempt
- Set Priority to: OCSP
- Close the preferences and quit Keychain Access
Hopefully Apple will release a security update soon which permanently blocks these certificates. If you want to go one step further you can also remove trust from Comodo’s root certificate altogether:
- Open Keychain Access
- Choose the ‘System Roots’ keychain in the top left
- Select the COMODO Certification Authority certificate
- Click on the ‘i’ at the bottom (or right-click and Get Info)
- Expand the ‘Trust’ area, and set ‘Never Trust’ when using this certificate.
- Close the window and Mac OS X will request your admin password.
Note that by doing this you will get browser SSL warnings when visiting websites that use Comodo-issues certificates.
- Security Update 2011-005 Fixes DigiNotar SSL Vulnerability
- Safari Errorjacking Vulnerability and Exploit [Patched]
- Updates: Mac OS X 2011-002, Safari 5.0.5, iOS 4.3.2
- Browser and Smartphone Exploits Fly at Pwn2Own [Recap]
- Apple Drops iOS 4.3 and Safari 5.0.4 Security Updates Ahead of Pwn2Own Contest