LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-21-2011, 02:10 PM   #1
Coresay
LQ Newbie
 
Registered: Apr 2011
Distribution: CentOS
Posts: 8

Rep: Reputation: 13
Question Sites that use SSL needlessly


I don't get it. Why do a lot of websites publish https links for no apparent reason, like: https://javaserverfaces.java.net.

Why would they want to create extra load on their servers for just a regular page that doesn't require login or exchange of info???
 
Old 04-21-2011, 03:03 PM   #2
Latios
Member
 
Registered: Dec 2010
Distribution: Arch
Posts: 115

Rep: Reputation: 21
https goes with a certificate which ensures that the site is authentic
 
Old 04-21-2011, 03:10 PM   #3
Medievalist
Member
 
Registered: Aug 2003
Distribution: Dead Rat
Posts: 191

Rep: Reputation: 56
SSL everywhere prevents eavesdropping and code insertion

If the only sites that used SSL were the ones that transmitted vitally important secrets, it would be trivial to find and attack those traffic streams. By running everything in SSL, including unimportant traffic, we protect the important traffic from new SSL exploits. That's the server side argument.

On the client side, using SSL and managing certificates properly in the client browser helps prevent false-AP attacks in coffee shops and other public wi-fi hotspots. If you are browsing an unencrypted website, and I have a browser exploit, I can insert it into your system using airpwn or similar tools.

Incidentally, I have never seen any noticeable server load from running SSL myself. The network I/O always chokes the traffic down more than the processor load does in any reasonably well designed application. When Google implemented HTTPS for gmail, they didn't add any new servers and they only saw a 1% increase in load on their old servers.

The only problem with 'SSL everywhere' as a philosophy is that it places power in the hands of the certificate authorities, who seem to be mostly amoral and incompetent.

Hope that helps!
 
1 members found this post helpful.
Old 04-21-2011, 03:29 PM   #4
silvyus_06
Member
 
Registered: Oct 2010
Distribution: Ubuntu 10.04 , Linux Mint Debian Edition , Microsoft Windows 7
Posts: 390

Rep: Reputation: 50
wow @Medievalist very breve explanation! nice work :-)

+that it makes sense to me...
 
Old 04-21-2011, 03:30 PM   #5
dugan
LQ Guru
 
Registered: Nov 2003
Location: Canada
Distribution: distro hopper
Posts: 11,221

Rep: Reputation: 5319Reputation: 5319Reputation: 5319Reputation: 5319Reputation: 5319Reputation: 5319Reputation: 5319Reputation: 5319Reputation: 5319Reputation: 5319Reputation: 5319
Quote:
Originally Posted by Coresay View Post
I tried to visit that site, and Chrome gave me a big red security warning. It said the SSL certificate being served was not for the site I was visiting, and that I should not proceed.

This is also your first day posting here.

Is there some funny business happening?

Also, if you visit the http version, you can see that that site does indeed take login information, and that the reason it uses https is therefore completely obvious.

Last edited by dugan; 04-21-2011 at 03:38 PM.
 
Old 04-21-2011, 03:33 PM   #6
silvyus_06
Member
 
Registered: Oct 2010
Distribution: Ubuntu 10.04 , Linux Mint Debian Edition , Microsoft Windows 7
Posts: 390

Rep: Reputation: 50
Quote:
Originally Posted by dugan View Post
I tried to visit that site, and Chrome gave me a big red security warning. It said the SSL certificate being served was not for the site I was visiting, and that I should not proceed.

This is also your first day posting here.

Is there some funny business happening?
wow yeah firefox reports it too
 
Old 04-21-2011, 03:46 PM   #7
lupusarcanus
Senior Member
 
Registered: Mar 2009
Location: USA
Distribution: Arch
Posts: 1,022
Blog Entries: 19

Rep: Reputation: 146Reputation: 146
Code:
javaserverfaces.java.net uses an invalid security certificate.

The certificate is only valid for the following names:
  www.java.net , java.net , website.java.net , hg.java.net , svn.java.net  

(Error code: ssl_error_bad_cert_domain)
What funkiness is going on here?

Last edited by lupusarcanus; 04-21-2011 at 03:47 PM.
 
Old 04-21-2011, 04:08 PM   #8
Coresay
LQ Newbie
 
Registered: Apr 2011
Distribution: CentOS
Posts: 8

Original Poster
Rep: Reputation: 13
Outstanding response Medievalist! Thank you. I 2nd post and I already learned something. So, using SSL for "unimportant" connections is for the benefit for all. But, if SSL doesn't cause significant load, then why do they make SSL offload cards? Anyway, based on your server-side argument, maybe it would be a good idea for ALL sites to use SSL to encrypt, but w/o necessarily needing a cert issued by an authority (self-signed), just for basic privacy measures. Then, we wouldn't have to use Tor so much. Any talk along those lines?

@Dugan, yes, this is my first day posting! But, I don't know what you mean by funny business. And that site was just an example; surely you've happened across other sites using https that don't require logins... but, that point is moot now. I guess I found it annoying that that site didn't have their cert updated, or was using one from the java.com site. I ignored the FF warning that went in anyway since their is only a risk of the site not being authentic (low risk in this case) and I didn't plan on sending sensitive info and the chance of it being a phishing site is also low.
 
Old 04-21-2011, 11:08 PM   #9
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by Medievalist View Post
If the only sites that used SSL were the ones that transmitted vitally important secrets, it would be trivial to find and attack those traffic streams. By running everything in SSL, including unimportant traffic, we protect the important traffic from new SSL exploits.
You're saying that the difficulty of targeting specific HTTPS connections increases with the amount of existent HTTPS connections? That sounds kind of weird to me, honestly. For example, say I use these three sites: google.com, bankofamerica.com, and linuxquestions.org. How exactly would using HTTPS on all three sites make it more difficult for a criminal to attempt to MITM (for example) my bankofamerica.com connection? How would using HTTPS only on bankofamerica.com make it easier to be directly targeted?

Last edited by win32sux; 04-21-2011 at 11:09 PM.
 
Old 04-22-2011, 02:06 AM   #10
Latios
Member
 
Registered: Dec 2010
Distribution: Arch
Posts: 115

Rep: Reputation: 21
Quote:
Originally Posted by Coresay View Post
Then, we wouldn't have to use Tor so much. Any talk along those lines?
The privacy benefit is limited in at least 2 ways :

Tor hides the URL, https does not. If anybody wants to know what you're reading, they may try to access the same URL themselfes. https will help only if the site returns content based on your input, without reloading the page / changing the URL

Even if the site gives content without reload, the domain name of the site is still visible. This alone can give enough information to the party you're hiding your business from
 
0 members found this post helpful.
Old 04-22-2011, 09:41 AM   #11
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by Latios View Post
Tor hides the URL, https does not. If anybody wants to know what you're reading, they may try to access the same URL themselfes.
The HTTPS URL is transmitted within the SSL connection, so it's not visible. What is visible to the bad guys is the domain name and port you're using. Also, keep in mind that any hiding Tor may do only applies within the Tor network. That is, the Tor exit node you're using will still have the same access any other non-Tor node would have. In the case of HTTPS, it'll mean domain/port... and in HTTP, well, everything.

Last edited by win32sux; 04-22-2011 at 09:42 AM.
 
Old 04-22-2011, 01:19 PM   #12
XavierP
Moderator
 
Registered: Nov 2002
Location: Kent, England
Distribution: Debian Testing
Posts: 19,192
Blog Entries: 4

Rep: Reputation: 475Reputation: 475Reputation: 475Reputation: 475Reputation: 475
Moved: This thread is more suitable in the Security forum and has been moved accordingly to help your thread/question get the exposure it deserves.
 
Old 04-22-2011, 01:30 PM   #13
nomb
Member
 
Registered: Jan 2006
Distribution: Debian Testing
Posts: 675

Rep: Reputation: 58
Quote:
Originally Posted by win32sux View Post
You're saying that the difficulty of targeting specific HTTPS connections increases with the amount of existent HTTPS connections? That sounds kind of weird to me, honestly. For example, say I use these three sites: google.com, bankofamerica.com, and linuxquestions.org. How exactly would using HTTPS on all three sites make it more difficult for a criminal to attempt to MITM (for example) my bankofamerica.com connection? How would using HTTPS only on bankofamerica.com make it easier to be directly targeted?
That isn't really what I took away from his statement. I believe he is more referring to how a lot of sites use SSL for the login, but then display regular pages without using SSL. When this happens You can pull session keys out of the traffic for the non-SSL'd pages and hijack the users session. However if you keep the whole site encrypted with SSL even the non-important pages, you can no longer use this attack vector. There are a lot of sites now changing over to encrypting the whole site ever since firesheep gave everyone a reality check.

But I could have misunderstood what he was trying to say.

nomb
 
Old 04-22-2011, 03:12 PM   #14
spankbot
Member
 
Registered: Aug 2007
Posts: 133

Rep: Reputation: 16
Quote:
Originally Posted by Coresay View Post
I don't get it. Why do a lot of websites publish https links for no apparent reason, like: https://javaserverfaces.java.net.

Why would they want to create extra load on their servers for just a regular page that doesn't require login or exchange of info???
In a perfect world, ALL SITES would use SSL. It does not add any additional load on modern servers (or clients) and users would get the benefit of never having to pay attention to whether or not SSL is being used.
 
1 members found this post helpful.
Old 04-23-2011, 01:12 AM   #15
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by nomb View Post
That isn't really what I took away from his statement. I believe he is more referring to how a lot of sites use SSL for the login, but then display regular pages without using SSL. When this happens You can pull session keys out of the traffic for the non-SSL'd pages and hijack the users session. However if you keep the whole site encrypted with SSL even the non-important pages, you can no longer use this attack vector. There are a lot of sites now changing over to encrypting the whole site ever since firesheep gave everyone a reality check.

But I could have misunderstood what he was trying to say.
Yeah, I know what you mean (and I agree). It just sounds to me like you and Medievalist are referring to two totally different things. In retrospect, however, I see how his/her statement can be interpreted in a number of different ways.

Besides, this explains why it sounded so weird to me.

Last edited by win32sux; 04-23-2011 at 01:14 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
ubuntu 9.10 apache2 multiple SSL sites eteck Linux - Networking 4 01-12-2010 12:31 AM
Squid SSL sites not working linuxgurusa Linux - Server 5 10-02-2009 08:48 AM
Can't access ssl sites via squid linuxgurusa Linux - Server 4 09-30-2008 08:17 AM
need help with apach virtual hosts ssl/non ssl sites danthach Linux - Networking 3 05-25-2006 06:40 AM
How to have SSL on two different pages/sites? Manuel-H Linux - General 1 08-05-2003 08:53 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:00 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration