Nmap Development mailing list archives

Re: Superfish support for ssl-known-key?


From: David Fifield <david () bamsoftware com>
Date: Thu, 19 Feb 2015 13:30:47 -0800

On Thu, Feb 19, 2015 at 12:59:31PM -0600, Daniel Miller wrote:
But how do we report it? It's not something one would expect to find on a
server, since it's used to MITM a client. If Nmap finds certs signed with this
root cert, I can see a few possibilities:

1. Nmap's traffic is being MITM'd by Superfish on the same machine. Not sure if
this is possible, since I don't know how it's actually modifying the traffic.

2. Nmap's traffic is being MITM'd by someone on the LAN. This is a real attack
to watch for, since the certificate and key are now public, and it can be
assumed there are hundreds or thousands of Lenovo laptops which will trust it.

3. The server actually has a Superfish-signed cert on the service. This seems
like the least-likely scenario, but it is the most-likely way that someone
would interpret the output of ssl-known-key, since Nmap isn't normally used for
detecting MITM.

Maybe it should be a different script. Case 2 is the one I really care
about, but case 3 is interesting too. Nmap is good for finding
information about the network path (i.e. filtering middleboxes), in
which category I would include SSL MITM.

Maybe something like:
|_Certificate signed by untrustworthy CA: Superfish, Inc. <SHA-1 etc.>

David
_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: