What is a digital certificate?

These are supposed to protect us, but they were an element of the Stuxnet attack.


Dear Control Engineering: I was reading about the Stuxnet attacks, and the term "digital certificates" came up. What are these, and how are they used in cyber protection strategies?

Digital certificates are a way of authenticating that software or a Website is actually genuine. It's the ID card or passport that goes along as authentication, but the system has some shortcomings. For a more in-depth answer, here are some thoughts from Matt Luallen on how it all works and how you can approach it with industrial networks.

As Matt puts it, everything comes down to a matter of trust:

"While certificates have their uses in a security regimen, they are not a bullet-proof method to ensure the authenticity of software, a person, or communications.

"Imagine this scenario: a woman is enjoying a cup of coffee at her favorite Wi-Fi hotspot, and uses her iPad to check her email. As she starts to login to Gmail, she doesn’t realize that the man sitting a few tables over, apparently working on his laptop, has intercepted her login and is pretending to be Gmail in an effort to capture her user name and password. Since he is on the same wireless network, he is able to answer faster than Google and preempt the genuine response. Her computer believes that he really is Gmail because he has presented a certificate that her computer has accepted as authentic. Once the criminal has that information, he can try that name and password on other applications because people routinely use the same names and passwords for multiple accounts. If you think this sort of thing couldn’t happen, it already has. A hacker in Iran stole or created working certificates for a group of applications, including Gmail, eBay, PayPal, and others.

"The attack vector works because all her browser needs to see is a legitimate certificate for the Website from a trusted authority. It may be stolen or forged, but it’s enough to do the job. Certificates are useful to show that Websites and software are trustworthy. It’s hard to imagine what Web surfing would be like if we had to stop at every site and manually give permission for it to load. However, they are not bullet-proof. There are many ways in which cyber criminals can circumvent the process.

"It was just about 10 years ago that Microsoft had an embarrassing time when it farmed-out its certificate authority management. Microsoft hired Verisign to administer its program, which was to include maintaining a certificate revocation list. Verisign received a request for a certificate from what was apparently an internal Microsoft user, but it was actually a stolen user account. Verisign generated the requested certificates which were then used repeatedly to cover bogus software. Eventually Verisign revoked the certificates, but they continued to work. The online certificate status protocol at the time called for applications to check the list for revocations, however this went almost entirely unheeded. It wouldn’t have helped anyway because Verisign did not compile the list — there was nothing to check. Solving that problem involved Microsoft issuing a software patch, setting up its own certificate authority, and enforcing use of the online certificate status protocol. That protocol is now a standard element within Web browsers to identify revoked certificates.

"There are more subtle ways in which the system can fail. More recently, part of Stuxnet’s success depended on using compromised certificates from JMI and Realtek. These convinced the Iranian systems that the malware was trusted.

"One of the main problems with certificates is that your system has to have its own reference of trusted certificate authorities. This is normally embedded into operating systems and browsers with a default list of sources, but most users are probably unaware of its existence and therefore don’t know what is on the list. Most users have no practical way to evaluate what’s there and decide if they agree with the evaluations of whoever compiled that database. The list cannot be static because new certificates will need to be added and compromised certificates that have been revoked or expired must be removed, otherwise they will continue to be effective.

"This very process of updating and correcting lists of trusted certificates has served as an attack vector. The Zeus botnet, for one, has the ability to go into a system and download certificate stores. It can also make its own additions to the list so your OS will accept a certificate it presents at a later date.

"Certificate authorities are companies and not, at least so far, government bodies. As we have seen over the last several years, companies can fail or change ownership under difficult conditions. Imagine if a trusted certificate authority was purchased by cyber criminals or fell under their influence. Just like the mafia buying its own bank to launder money, such a group could create powerful resources for those criminals. While such a thing has not happened yet, at least to my knowledge, there is little to prevent it. Government participation in the process is probably not far off, for better or worse, but we can only speculate what form it might take.

"International standards organizations now require certificates under certain circumstances. ICSJWG 2009 provided a great presentation by ABB discussing the challenges of certificate authorities, certificate management, and the immaturity of integration within the control system space. So far, relatively few require their integration. Examples include IEC 62351, Secure DNP3/TCP, and OPC-UA. If you ask the nearest traditional IT web administrators when the last time was that they had any difficulties managing certificates, they’ll probably mention a time when they initially expire unnoticed.

"So if the certification system has so many flaws, how should a user organization use it? Does it provide any practical value? The answer is yes, but only if the environment is appropriately managed. It will not work by itself. Here are some suggested steps:

• Find out what is in the databases attached to your operating systems, applications, and browsers. With some persistence, you can find the lists in systems provided by Microsoft, Apple, etc.

• Understand who the certificate authorities are and which are most trustworthy. This is easier said than done, because as of this writing, there are few if any resources available, so you’re basically on your own. At least for control system environments it is much simpler as most of the certificate authorities would be removed. You will need to work with your control system vendor to discern which certificates are necessary in your environment.

• Enforce internal procedures regarding issuing, revoking, and re-issuing certificates already in place. You do not want to use self-signed certificates and then simply instruct your users to “accept the new certificate authority.” This is a common practice that can lead to disastrous consequences. 

"Ultimately you need to understand whom you trust both personally and electronically. Certificate authorities are the validating entity that has a process to associate an entity with an electronic identifier, the digital certificate. If you do not trust the authoritative body or how the receiver of the identity manages it, then remove it from your electronic devices. Once again, ensure that you are not required by your systems to have the trust before removal."

--Matt Luallen


No comments
The Top Plant program honors outstanding manufacturing facilities in North America. View the 2015 Top Plant.
The Product of the Year program recognizes products newly released in the manufacturing industries.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Safer human-robot collaboration; 2017 Maintenance Survey; Digital Training; Converting your lighting system
IIoT grows up; Six ways to lower IIoT costs; Six mobile safety strategies; 2017 Salary Survey
2016 Top Plant; 2016 Best Practices on manufacturing progress, efficiency, safety
Future of oil and gas projects; Reservoir models; The importance of SCADA to oil and gas
Big Data and bigger solutions; Tablet technologies; SCADA developments
SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
What controller fits your application; Permanent magnet motors; Chemical manufacturer tames alarm management; Taking steps in a new direction
Commissioning electrical systems; Designing emergency and standby generator systems; Paralleling switchgear generator systems
Package boilers; Natural gas infrared heating; Thermal treasure; Standby generation; Natural gas supports green efforts

Annual Salary Survey

Before the calendar turned, 2016 already had the makings of a pivotal year for manufacturing, and for the world.

There were the big events for the year, including the United States as Partner Country at Hannover Messe in April and the 2016 International Manufacturing Technology Show in Chicago in September. There's also the matter of the U.S. presidential elections in November, which promise to shape policy in manufacturing for years to come.

But the year started with global economic turmoil, as a slowdown in Chinese manufacturing triggered a worldwide stock hiccup that sent values plummeting. The continued plunge in world oil prices has resulted in a slowdown in exploration and, by extension, the manufacture of exploration equipment.

Read more: 2015 Salary Survey

Maintenance and reliability tips and best practices from the maintenance and reliability coaches at Allied Reliability Group.
The One Voice for Manufacturing blog reports on federal public policy issues impacting the manufacturing sector. One Voice is a joint effort by the National Tooling and Machining...
The Society for Maintenance and Reliability Professionals an organization devoted...
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.
Maintenance is not optional in manufacturing. It’s a profit center, driving productivity and uptime while reducing overall repair costs.
The Lachance on CMMS blog is about current maintenance topics. Blogger Paul Lachance is president and chief technology officer for Smartware Group.
This digital report will explore several aspects of how IIoT will transform manufacturing in the coming years.
Motion control advances and solutions can help with machine control, automated control on assembly lines, integration of robotics and automation, and machine safety.
This article collection contains several articles on preventing compressed air leaks and centrifugal air compressor basics and best practices for the "fifth utility" in manufacturing plants.
Maintenance Manager; California Oils Corp.
Associate, Electrical Engineering; Wood Harbinger
Control Systems Engineer; Robert Bosch Corp.
click me