For several hours December 8, Google's Doubleclick ad network requested client authentication certificates when browsing to web properties that contained Doubleclick advertising.
In the physical world, you often conduct business with others face-to-face. If you do not personally know someone, you might rely on a trusted third party to vouch for the person's identity. That trusted third party might be a mutual friend, or it might be a government office that issues identification documents (passports, driver's licenses, state identification cards, school IDs, and the like).
Digital authentication certificates are the online equivalent of an identification card, using mathematical encryption algorithms to ensure that only the proper owner of a certificate is able to use it.
Generally, digital certificates are associated with a web server: you want to know that you are buying from amazon.com and not from fake-amazon.com. You don't have to provide your own certificate, because the web server (much like a brick-and-mortar store) is open to all visitors. In this case however, Doubleclick asked your browser for a digital certificate anyway.
Chances are this was an honest mistake, but it got me thinking: could the same approach be used deliberately for ill gain?
The most likely cause is that the ad network inadvertently enabled mutual SSL authentication (though there has been no public confirmation of this). For home users, the only effect would generally be a pop-up message asking the user to install a certificate, as client authentication certificates are not common among home users.
Chances are this was an honest mistake, but it got me thinking: could the same approach be used deliberately for ill gain?
Many enterprises though do have client authentication certificates, so the user would instead see a popup asking them to select a certificate to use. Depending on the particulars of a company, these certificates might have contained email address, client hostnames, issuing server FQDNs, and (in Windows shops) information about Active Directory org unit structure. Sufficient information of this nature could be of minor benefit to an adversary conducting research on a target.
Deliberately using client authentication certificates to track users or gain insight into a corporation's network structure is hardly stealthy. I can't really imagine it being worthwhile given how noisy it is ... but still, it makes the creative juices flow.
Have any readers played with clever ways to use or abuse client authentication certificates?