-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS MITM in Kazakhstan, again #56
Comments
I archived the certificate file here: https://archive.org/details/isca-ca-certificate. Curiously, the outside-in test from #6 (comment) does not appear to work this time. It gives a "mismatched SAN" error, not a "unable to get local issuer certificate" error.
I do not yet see the certificate's SPKI fingerprint (
|
I believe this is the same TSARKA that in 2019 claimed credit (archive) for moderating a discussion to end the MITM that was happening then. Currently at https://tsarka.org/press-center (archive) I do not see anything about the current MITM. |
I figured out what was going wrong here.
We find the expected 8e12... fingerprint if we peek into the JSON header of the crl-set file:
Support for
|
How if they finally decrypted TLS? Either by "state owned" browser or by calculate private key with an experimental quantum computer. I'm worry about that. |
On 2020-12-05, the government of Kazakhstan announced an "exercise" and told people they would have had to install a root TLS certificate in order to access certain foreign web sites. The next day, users in the capital city of Nur-Sultan reported TLS man-in-the-middle attacks. The situation is very similar to what happened in July of last year.
https://www.gov.kz/memleket/entities/mdai/press/news/details/132113?lang=ru (archive)
Catalin Cimpanu has an article with a screenshot of the message displayed to users of the ISP Beeline:
https://www.zdnet.com/article/kazakhstan-government-is-intercepting-https-traffic-in-its-capital/ (archive)
There's discussion and links in a Bugzilla ticket:
https://bugzilla.mozilla.org/show_bug.cgi?id=1680927 (archive)
Censored Planet, who thoroughly investigated the MITM in Kazakhstan last year, has started measuring how many vantages in Kazakhstan are showing MITM by the new root certificate. They have also compiled a list of affected domains and found the likely IP addresses of the interception devices. According to my reading of their graph, the MITM was only in effect on 2020-12-06 and stopped happening after that day.
https://censoredplanet.org/kazakhstan/live (archive)
On 2020-12-18, browser vendors added the new MITM certificate to a blocklist to prevent it from being used, even by users who had installed it manually.
https://www.zdnet.com/article/apple-google-microsoft-and-mozilla-ban-kazakhstans-mitm-https-certificate/ (archive)
The text was updated successfully, but these errors were encountered: