※ 本文轉寄自 ptt.cc, 文章原始頁面
看板Gossiping
標題

[新聞] 歐盟打算監聽所有人的網路連線

最新2023-11-13 14:25:00
留言34則留言,23人參與討論
推噓11 ( 13219 )
備註請放最後面 違者新聞文章刪除 1.媒體來源: The Register 2.記者署名: Thomas Claburn 3.完整新聞標題: Bad eIDAS: Europe ready to intercept, spy on your encrypted HTTPS connections EFF warns incoming rules may return web 'to the dark ages of 2011' 4.完整新聞內文: Lawmakers in Europe are expected to adopt digital identity rules that civil soci ety groups say will make the internet less secure and open up citizens to online surveillance. The legislation, referred to as eIDAS (electronic IDentification, Authentication and trust Services) 2.0, has been described as an attempt to modernize an initi al version of the digital identity and trust service rules. The rules cover thin gs like electronic signatures, time stamps, registered delivery services, and ce rtificates for website authentication. But one of the requirements of eIDAS 2.0 is that browser makers trust governme nt-approved Certificate Authorities (CA) and do not implement security controls beyond those specified by the European Telecommunications Standards Institute (E TSI). Under eIDAS 2.0, government-endorsed CAs – Qualified Trust Service Providers, o r QTSPs – would issue TLS certificates – Qualified Website Authentication Cert ificates, or QWACs – to websites. But browser makers, if they suspect or detect misuse – for example, traffic int erception – would not be allowed to take countermeasures by distrusting those c ertificates/QWACs or removing the root certificate of the associated CA/QTSP fro m their list of trusted root certificates. Put simply: In order to communicate securely using TLS encryption – the technol ogy that underpins your secure HTTPS connections – a website needs to obtain a digital certificate, issued and digitally signed by a CA, that shows the website address matches the certified address. When a browser visits that site, the web site presents a public portion of its CA-issued certificate to the browser, and the browser checks the cert was indeed issued by one of the CAs it trusts, using the CA's root certificate, and is correct for that site. If the certificate was issued by a known good CA, and all the details are correc t, then the site is trusted, and the browser will try to establish a secure, enc rypted connection with the website so that your activity with the site isn't vis ible to an eavesdropper on the network. If the cert was issued by a non-trusted CA, or the certificate doesn't match the website's address, or some details are wrong, the browser will reject the website out of a concern that it's not connec ting to the actual website the user wants, and may be talking to an impersonator . Here's one problem: if a website is issued a certificate from one of those afore mentioned Euro-mandated government-backed CAs, that government can ask its frien dly CA for a copy of that certificate so that the government can impersonate the website – or ask for some other certificate browsers will trust and accept for the site. Thus, using a man-in-the-middle attack, that government can intercept and decrypt the encrypted HTTPS traffic between the website and its users, allo wing the regime to monitor exactly what people are doing with that site at any t ime. The browser won't even be able to block the certificate. As Firefox maker Mozilla put it: This enables the government of any EU member state to issue website certificates for interception and surveillance which can be used against every EU citizen, e ven those not resident in or connected to the issuing member state. There is no independent check or balance on the decisions made by member states with respect to the keys they authorize and the use they put them to. How that compares to today's surveillance laws and powers isn't clear right now, but that's the basically what browser makers and others are worried about: gove rnment-controlled CAs being abused to issue certificates to websites that allow for interception. If an administration tried using a certificate not issued by a trusted CA, browsers would reject the cert and connection, hence Europe's desir e to make browser makers accept government-backed CAs. Certificates and the CAs that issue them are not always trustworthy and browser makers over the years have removed CA root certificates from CAs based in Turkey , France, China, Kazakhstan, and elsewhere when the issuing entity or an associa ted party was found to be intercepting web traffic. Many such problems have been documented in the past. An authority purge of this sort occurred last December when Mozilla, Microsoft, Apple, and later Google removed Panama-based TrustCor from their respective lists of trusted certificate providers. Yet eIDAS 2.0 would prevent browser makers from taking such action when the CA h as a government seal of approval. "Article 45 forbids browsers from enforcing modern security requirements on cert ain CAs without the approval of an EU member government," the Electronic Frontie r Foundation (EFF) warned on Tuesday. "Which CAs? Specifically the CAs that were appointed by the government, which in some cases will be owned or operated by that selfsame government. That means cr yptographic keys under one government's control could be used to intercept HTTPS communication throughout the EU and beyond." The foundation added the rules "returns us to the dark ages of 2011, when certif icate authorities could collaborate with governments to spy on encrypted traffic — and get away with it." Mozilla and a collection of some 400 cyber security experts and non-governmental organizations published an open letter last week urging EU lawmakers to clari fy that Article 45 cannot be used to disallow browser trust decisions. "If this comes to pass it would enable any EU government or recognized third par ty country to begin intercepting web traffic and make it impossible to stop with out their permission," the letter warns. "There is no independent check or balan ce on this process described in the proposed text." In an email to The Register, a Mozilla representative added, "Mozilla is deeply concerned by the proposed legislation and is continuing to engage with key stak eholders in the final stages of the trilogue process. We are committed to securi ty and privacy on the Internet and have been heartened by the outpouring of supp ort from civil society groups, cyber security experts, academics, and the public at large on this issue. We are hopeful that this heightened scrutiny will motiv ate EU negotiators to change course and deliver regulation with suitable safegua rds." Google has also raised concerns about how Article 45 might be interpreted. "We a nd many past and present leaders in the international web community have signifi cant concerns about Article 45's impact on security," the Chrome security team argued, and urged EU lawmakers to revise the legal language. According security researcher Scott Helme, the latest regulatory language – whi ch has not been made public – is still problematic. The EFF says the legislative text "is subject to approval behind closed doors in Brussels on November 8." ® 5.完整新聞連結 (或短網址)不可用YAHOO、LINE、MSN等轉載媒體: https://www.theregister.com/2023/11/08/europe_eidas_browser/ 6.備註: CNNIC跟沃通:老鄉,你好,希望你比我們死的還慘 歐盟敢這麼做,我一定DDoS爆破他們伺服器,如果可以,我連他們的機密都要挖出來 這已經不是可以玩五樓哽的東西了,你能想像對岸監聽全世界的一切通訊嗎? -- ※ 發信站: 批踢踢實業坊(ptt.cc), 來自: 111.82.109.225 (臺灣) ※ 文章網址: https://www.ptt.cc/bbs/Gossiping/M.1699707019.A.EBB.html

34 則留言

cs09312, 1F
有差嗎? 正常人哪會怕 反正我搜尋的東西106.64.169.59

cs09312, 2F
都是合法的阿106.64.169.59

spring719, 3F
五樓蘿莉控不敢去歐洲惹111.82.29.144

joumay, 4F
DPP: 尬廣跟上36.224.150.39

AustinRivers, 5F
笑死36.230.222.18

jdklas, 6F
有可能嗎....是打算讓人上街頭開趴膩111.83.176.7

johnhmj, 7F
笑死 最講求隱私權的反而要搞監聽49.216.177.133

Qinsect, 8F
滯支:個資看光有差嗎1.169.160.142

JudgmentLin, 9F
黑暗騎士演過了114.140.73.239

ams9, 10F
另一中文說明 https://bit.ly/47kV7rC111.248.223.221

rs6000, 11F
馬英九:沒有違法就不用擔心監聽。110.54.175.68

conqueror507, 12F
抄襲中國共產黨是不是?1.172.77.174

skycat2216, 13F
覺得沒違法就不用擔心的我搞不懂你們111.82.109.225

skycat2216, 14F
憑什麼沒違法還要把一切紀錄交給歐盟111.82.109.225

yulis, 15F
難道米國沒做嗎111.242.73.203

atobela, 16F
憑證給政府管,駭客的目標就更簡單了36.225.232.101

huangfly, 17F
中國:這個我熟,我可以提供你幫助175.180.76.50

moon128, 18F
中共才敢這樣搞 歐盟真的敢?118.166.77.115

iosian, 19F
(本文已被監聽)107.5.4.16

kingstongyu, 20F
哈!歐盟有能力嗎?!俄羅斯駭客都比歐61.224.206.134

kingstongyu, 21F
盟強了,電腦可是美國人發明的61.224.206.134

abomgo, 22F
憑什麼不行,你怕?220.142.30.50

skycat2216, 23F
樓樓上,他們不需要駭,只是要所有瀏111.82.109.225

skycat2216, 24F
覽器廠商預置他們的CA還不得移除111.82.109.225

skycat2216, 25F
這樣就足夠他們作為中間人監聽一切留111.82.109.225

HowLeeHi, 26F
不得移除我認為不太可能,現在一堆開源了36.231.0.129

HowLeeHi, 27F
比較有可能秘密跟目前CA合作36.231.0.129

HowLeeHi, 28F
但是大眾無得知是哪個root CA36.231.0.129

HowLeeHi, 29F
但目前有了CT,偽造證書很容易被發現36.231.0.129

alfworld, 30F
看不懂內容的人別亂說!84.115.211.32

jay0215, 31F
中國:歐盟老鐵真給力!118.167.201.115

jay0215, 32F
美國+中國+歐盟:我們就是要監聽全球網路118.167.201.115

jay0215, 33F
連線,誰贊成?誰反對?118.167.201.115

biglarge, 34F
放心,過不了的法案61.219.107.222