Author Archives: Hacker Medic

Internet Explorer ???????????????????????????UXSS?????

攻撃者は、Internet Explorer の新しいゼロデイ脆弱性を悪用すると、クロスサイトスクリプティング(XSS)によって同一生成元ポリシーを回避できる可能性があります。

Read More

2755801 – Update for Vulnerabilities in Adobe Flash Player in Internet Explorer – Version: 37.0

Revision Note: V37.0 (February 5, 2015): Added the 3021953 update to the Current Update section.Summary: Microsoft is announcing the availability of an update for Adobe Flash Player in Internet Explorer on all supported editions of Windows 8, Windows S…

Microsoft Internet Explorer?? Universal XSS ??? ??

Internet Explorer에서 새로 발견된 제로데이 취약점은 공격자가 크로스 사이트 스크립팅(XSS)을 통해 SOP(Same-Origin Policy)를 우회하는 것을 가능케 합니다.

Read More

Universal XSS vulnerability discovered in Microsoft Internet Explorer

A new zero-day vulnerability in Internet Explorer could allow attackers to bypass the same-origin policy through cross-site scripting (XSS).Read More

Non-FQDN transition

      No Comments on Non-FQDN transition
Twitter Card Style: 

summary

The CA/Browser Forum is an unincorporated association of separate organizations that creates the guidelines that apply to all SSL certificate and browser providers. Since the effected date of 1 July 2012 Symantec has been notifying customers in regards to certificates with a SAN or Common Name (CN) field that contains a Reserved IP Address or Internal Server Name since they are being phased out due to CA/Browser Forum standards.

This one particular standard has some customers in a bind when renewing or enrolling into a CA signed SSL certificate. Below is the Standard.

abc123-local 400X.jpg

9.2.1Subject Alternative Name Extension

Certificate Field: extensions:subjectAltName

Required/Optional: Required

Contents: This extension MUST contain at least one entry. Each entry MUST be either a dNSName containing the Fully-Qualified Domain Name or an iPAddress containing the IP address of a server. The CA MUST confirm that the Applicant controls the Fully-Qualified Domain Name or IP address or has been granted the right to use it by the Domain Name Registrant or IP address assignee, as appropriate.

Wildcard FQDNs are permitted.

As of the Effective Date of these Requirements, prior to the issuance of a Certificate with a subjectAlternativeName extension or Subject commonName field containing a Reserved IP Address or Internal Name, the CA SHALL notify the Applicant that the use of such Certificates has been deprecated by the CA / Browser Forum and that the practice will be eliminated by October 2016. Also as of the Effective Date, the CA SHALL NOT issue a certificate with an Expiry Date later than 1 November 2015 with a subjectAlternativeName extension or Subject commonName field containing a Reserved IP Address or Internal Name. Effective 1 October 2016, CAs SHALL revoke all unexpired Certificates whose subjectAlternativeName extension or Subject commonName field contains a Reserved IP

Address or Internal Name.

(More information about the CA/B Forum Baseline Requirements can be found at cabforum.org)

This standard means SSL certificates can only be issued to Fully Qualified Domain Names (FQDN) and can no longer be issued to Non-Valid internal names.

Example:

Valid FQDN’s

Non-Valid Internal

abc.com

abc.local

secure.abc.com

abcServer123

autodiscover.abc.com

192.168.0.1

In response to this change customers have to take two main course of action:

  1. Change the common names and reissue their SSL certificates
  2. Move to certificates chained to a private root with two options:
    1. Develop a self-signed internal Certification Authority (CA)
    2. Use a Private CA from Symantec

To help our customers avoid the dangers of a self-signed CA, Symantec is now offering the Private CA.

private_CA_graphic 600X.jpg

The Symantec Private CA ensures:

  • Compliance
  • Support
  • Reduces the time
  • Reduce hidden costs of in house solutions.

This is offered though the Managed PKI for SSL Account. Use the same console to managed external as well as internal certificates.  Ask your account manager for more details! More detailed Information on the Symantec Private CA can be found at www.Symantec.com/private-ssl

Happy Digital Learning Day!

      No Comments on Happy Digital Learning Day!
Twitter Card Style: 

summary

When my older daughter started middle school I was invited to the website where her grades were available real-time.  They’re updated continually by her teachers based on every quiz, homework assignment, and test that she takes. This is a substantial improvement over infrequent report cards and teacher meetings, giving me the ability to detect, early on, any areas needing greater focus (not that it’s needed with my straight-A student). Unfortunately, when I checked the security of the site, I found that “secure login” was optional and, in the case of the middle-school’s implementation, everything was completely unsecured. This included not only my kid’s grades but also the ability to look her up and message her directly. While the school fixed this very quickly, it highlights how easy it is for site operators to miss even the most basic of security practices. As more education is done and administered online, the bar is only getting higher for institutions to protect their student data as well as their own. 

As the world’s largest security company, we continually ask how we can educate people about security and whether the sites that they are visiting are secure. The bottom line is that it needs to be simple — yes or no. The Norton Secured Seal communicates that “yes, this site is secure” to more people than any other seal or browser-based visual cue. Behind the scenes there’s a lot that goes into the display of that seal… Is the data encrypted? Is the site run by a legitimate company? Is the site free from Malware? Only when the answer is yes to all of these questions will visitors see the Norton Secured Seal.

NSec_SYM_MKTG_RGB.jpg

In honor of Digital Learning Day, we are doing our part to both keep people secure and to educate the world about security. Combined with our 24/7 support team, we hope to increase security at educational institutions and let them easily train their visitors to look for the seal that tells them that they’re secure.