Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
United Kingdom Education Networking Privacy The Internet Your Rights Online

School Tricks Pupils Into Installing a Root CA 417

First time accepted submitter paddysteed writes "I go to secondary school in the UK. I went digging around the computers there and found that on the schools machines, there was a root CA from the school. I then suspected that the software they instruct windows users to install on their own hardware to gain access to the BYOD network installed the same certificate. I created a windows virtual machine and connected to the network the way that was recommended. Immediately afterwards I checked the list of root CA's, and found my school's. I thought the story posted a few days ago was bad, but what my school has done is install their certificate on people's own machines — which I think is far worse. This basically allows them to intercept and modify any HTTPS traffic on their network. Considering this is a boarding school, and our only method of communicating to the outside world is over their network, I feel this is particularly bad. We were not told about this policy and we have not signed anything which would excuse it. I confronted the IT department and they initially denied everything. I left and within five minutes, the WiFi network was down then as quickly as it had gone down, it was back up. I went back and they confirmed that there was a mistake and they had 'fixed' it. They also told me that the risk was very low and the head of networks told me he was willing to bet his job on it. I asked them to instruct people to remove the bad certificate from their own machines, but they claimed this was unnecessary due to the very low risk. I want to take this further but to get the school's management interested I will need to explain what has happened and why it is bad to non-technical people and provide evidence that what has been done is potentially illegal."
This discussion has been archived. No new comments can be posted.

School Tricks Pupils Into Installing a Root CA

Comments Filter:
  • yeah. (Score:5, Interesting)

    by Anonymous Coward on Sunday March 09, 2014 @03:58AM (#46438447)

    Just because you have a trusted root installed to use apps or the institutions wireless doesn't mean they were out to spy on you. It was likely the cheapest way to make secured applications run internally, or the easiest way for them to deploy eap without having to have you turn off server cert verification in your supplicant, which is way worse than having a trusted root.

    • Re:yeah. (Score:4, Insightful)

      by sumdumass ( 711423 ) on Sunday March 09, 2014 @04:34AM (#46438571) Journal

      That's all and good and all, but I think disclosing the information would be preferable so that little conspiracies about doom and gloom didn't come from the discovery of it.

      In other words, if there was a valid reason, then it shouldn't be a secret. It should be a valid reason and disclosed in some obvious way.

      • Re:yeah. (Score:5, Insightful)

        by Zakabog ( 603757 ) <.moc.guamj. .ta. .nhoj.> on Sunday March 09, 2014 @07:30AM (#46439023)

        Never attribute to malice that which is adequately explained by stupidity.

        I've worked with a lot of IT people and sometimes they're just not competent enough to realize what's happening on their network. This sounds like a long time ago someone was sold on the idea that a firewall that scans all network traffic for malware would be a very good thing, and part of the requirements for that would be installing the root CA so the HTTPS traffic can be decrypted and scanned for malware. The staff the submitter dealt with likely never knew this was happening at all, then after the conversation the IT staff might have poked around in their firewall and found some checkbox that said "Scan all HTTPS traffic" and unchecked it. They might not know enough to help everyone remove the root CA.

  • by Travis Mansbridge ( 830557 ) on Sunday March 09, 2014 @03:59AM (#46438453)
    All in all, it's just another brick in the firewall
    • I think you will find that they will squash you like a bug if you make a fuss. Is this really something worth fighting for?

  • In their defence. (Score:5, Informative)

    by SuricouRaven ( 1897204 ) on Sunday March 09, 2014 @04:03AM (#46438469)

    I work at a school. Yes, we have all machines on their network trust us as a root CA. We do that with good reason.

    Currently in most countries, especially the UK, there is an atmosphere of paranoia bordering on terror anywhere that minors and sex may come within a hundred meters of each other. Even so, teenagers tend to meet their stereotype and display a fascination with sexual imagery. This means that it is absolutely essential that schools maintain a comprehensive internet content filter. This is not an optional extra. Without it, it's only a matter of time (and not much time) before some student happens across Dirty Dave's Scat and Fisting Gallery and shows it off to all his classmates. This in turn results in many terrified parents, legal action against the school for destroying jimmy's innocent little mind, and columns in the Daily Mail demanding the head be fired.

    If we could not filter the internet, there would be no option but to forgo it. If we could not filter the ssl sites, there would be no option but to block ssl entirely by blocking all traffic on port 443. There is no possibility of effectively filtering SSL without installing a root CA, and so that is what we have to do for any device on our network that needs SSL connectivity.

    Got that? No filtering, no internet. That's just the way it is. I don't like censorship more than anyone else, but this is the real world and sometimes ideology has to take a back seat to practicality and an angry mob of parents. Besides, without effective filtering, the students would spend more time playing flash games, watching the yogscast, listening to music videos and checking facebook than actually doing their work. Giving the students a locked-down and heavily censored internet is still better than giving them no internet at all, which would hold them back academically.

    • by KingOfBLASH ( 620432 ) on Sunday March 09, 2014 @04:24AM (#46438541) Journal

      How about actually, you know, paying attention to what the kids in class are doing?

      I don't really understand why every time a new technology comes along people think there needs to be new rules. Pornography and inappropriate images were not invented along with the internet. I can remember back when somebody would raid their fathers stash of playboys and bring one into school, and kids would be huddled around it. And, guess what, if a teacher or parents saw all these kids obviously up to no good, they would come over, and there would be hell to pay. Which still didn't stop kids from looking at pornography or doing dirty things.

      Besides, why in the world do kids need access to computers in the classroom? When kids are working in a computer lab or something, have someone watching them. If you can't trust them to not look at porn, then they're not mature or old enough to be left alone with a computer.

      • How about actually, you know, paying attention to what the kids in class are doing?

        I don't really understand why every time a new technology comes along people think there needs to be new rules. Pornography and inappropriate images were not invented along with the internet. I can remember back when somebody would raid their fathers stash of playboys and bring one into school, and kids would be huddled around it. And, guess what, if a teacher or parents saw all these kids obviously up to no good, they would come over, and there would be hell to pay. Which still didn't stop kids from looking at pornography or doing dirty things.

        Oh come now. There has been a sea change, and if you are old enough, you know it. It really was harder to get, harder to get away with, and the curve was skewed toward a 1. quick look at some breasts rather than 2. a jaded wondering what could be harder than hardcore.

        Honestly, there will be plenty of time for that when you are an adult ... you aren't missing anything.

        Besides, why in the world do kids need access to computers in the classroom? When kids are working in a computer lab or something, have someone watching them. If you can't trust them to not look at porn, then they're not mature or old enough to be left alone with a computer.

        Now this, I heartily agree with.

        • by richlv ( 778496 ) on Sunday March 09, 2014 @06:15AM (#46438805)

          Honestly, there will be plenty of time for that when you are an adult ... you aren't missing anything.

          if you are young and reading this, know :

          HE'S LYING.

          • if you are young and reading this, know :

            HE'S LYING.

            If you are young and modded the above funny, you're wrong.

      • It is a boarding school, maybe 35 hours might be spent in a classroom, just a small fraction of the 168 hours they are at the school for during term time. Some might not even go home during the shorter breaks like a weeks half term.

        The school has the responsibility for those kids 24/7 most of the year. It may seem a little harsh but these kids are not destined to work in factories or Mcdonalds. Their parents are paying a lot of money to have them study there.

        It is a difficult role the school has to take on

      • How about actually, you know, paying attention to what the kids in class are doing?

        That's what filtering does.

        If you want to pay for an internet monitor to look over children's shoulders, I'm sure schools will institute your policies.

      • by SuricouRaven ( 1897204 ) on Sunday March 09, 2014 @07:03AM (#46438929)

        One teacher. Thirty students. Alt-tab.

    • by DarkOx ( 621550 )

      Or you could maybe try just explaining that it's both impossible to really effectively filter the internet and respect students privacy. As we are talking boarding school here it is being used for personal communications, probably interacting with financial and medical institutions by many students; things students at day would not need to do.

      Parents waive all sorts of things as it is to send children to these schools. Just get the agree that filtering the internet will be less than 100% effective and tha

    • Re: (Score:2, Interesting)

      by mikechant ( 729173 )

      If we could not filter the ssl sites, there would be no option but to block ssl entirely by blocking all traffic on port 443.

      Then that's what you should do. Intercepting an SSL session between (say) a pupil and their bank would potentially be illegal without the permission of both the pupil *and* the bank. And the bank is not going to give this permission. Blocking ssl is the only legally safe solution.
      Still, it's your legal risk, up to you.

  • by Zarhan ( 415465 ) on Sunday March 09, 2014 @04:12AM (#46438501)

    I don't see the problem with the tech itself. If you have a "BYOD's allowed" policy, that also usually states that "if you put your own device in, here are the rules". Rules may state installing the network owner's root CA and allowing for traffic to be inspected.

    In most cases, this is intended to be benevolent - it's kind of hard to run threat detection algorithms on an encrypted connection. In business environments, DLP and similar can of course be used too.

    Now, in here I think the key issue was that the users were not told about the practice, and were not asked to agree to these stipulations. And of course, the old adage about not attributing to malice what can be explained by incompetence also applies here - if the issue got "fixed" then it might have been simply just that, incompetence. Somebondy enabled the same SSL interception on the student network that they are using for faculty, or similar.

  • This is a common problem in that most users lack the knowledge that you obviously have, and are willing to follow like blind sheeple, even with some very very bad advice.

    This is by no means limited to IT. Any profession with specialists (with specialized knowledge) will have similar effects. Were you to go through medical school it's possible you'd disagree more with your doctor, but you simply lack the knowledge. Were you to go through law school, you might decide your lawyer is an idiot (and gives bad

    • One problem is that the school's IT "specialists" are not specialists. They're basically going to be inexpensive IT flunkies and one IT admin. You'd have to get up to the level of a school district before they start hiring people more like what you'd expect in a large corporation.

      • Which is funny because even a guy driving a forklift is supposed to be licensed. IMHO, problems like this often arise because there is no clear way of judging if a candidate for a job is good or bad. Of course IT is not the only industry with this problem; if we'd made some of those bankers / quants do some sort of qualification maybe the sub prime mess wouldn't of happened. Of course there is also the importance of balance; obviously you don't want to be told you can't use the 1m deep hotel pool because

        • This is IT. You can have a bag full of certificates and not know what a root cert is. These guys aren't the equivalent of bankers, they're the bank tellers.

        • Licenses and certifications do not really mean squat. Remember back in the day when everyone got the MSCE or MSCA for windows 2000 and you could get it by studying a mail order book and passing 3 or 4 tests without ever having any working knowledge outside the books and the limited test software that came with it. Well, if you don't, it meant that a lot of people sporting a lot of qualifications were almost completely clueless when they had to do something that wasn't spelled out exactly like the book. That

  • by joelleo ( 900926 ) on Sunday March 09, 2014 @04:25AM (#46438547)

    Per the subject - that root ca only covers your school's applications. If you go to https://www.yourschool.com/ [yourschool.com] it ensures that your computer can vet out the complete certificate trust chain. However, if you can establish a connection to https://www.xhamster.com/ [xhamster.com] your school will not be able to peer into the encrypted contents of the connection unless you're connecting via a proxy that they control.

    If you think "Root CA BAAAAD!" then you're not looking deeply enough into ssl or the security concepts behind the certificates to understand their ramifications. Stay in school and dig deeper.

    • Re: (Score:2, Informative)

      by Anonymous Coward

      Why are you assuming that we don't know a proxy would be required?

      Why are you assuming, for that matter, that a proxy changes anything? Whether they're mandatory proxies or transparent proxies, it doesn't change the fact that the man in the middle has everything he needs.

      • by joelleo ( 900926 ) on Sunday March 09, 2014 @04:47AM (#46438597)

        A root ca for an organization cannot interpose itself into the certificate chain of another organization - that's kinda the whole point to the certificate "chain" of trust. His school would have to either use their own root ca and force clients to use their proxy - a very real and frequently implemented setup - or have spoofed a cert on the site as provided by its web server which chains up to his school's root, which is very unlikely and very unwieldy.

        In his case, the root ca he's so concerned about will only secure comms with the servers that use a cert derived from that root ca or one of its subordinates. If he goes to https://www.anonymouscowards.c... [anonymouscowards.com] and the cert provided by the server doesn't successfully chain up to his school's root cert he'll receive a giant ssl error saying the connection is untrusted. There's no mitm here unless he goes through a proxy.

        • by DarkOx ( 621550 ) on Sunday March 09, 2014 @05:09AM (#46438657) Journal

          Not quite true, many of the next gen firewalls transparently intercept sell and proxy only the ssl tunnel information itself, they negotiate with the sever and then with the client ( faking up a valid certificate from the orgs trusted root along the way ) the same symmetric keys are chosen for both sides of the connection so most packets can just be passed form client to server and vice versa; but the ips and content filtering engines still see everything

        • Yes, but if they have proxy or intelligent firewall, they can rewrite or redirect all connections to something using one of their own certificates derived from their own root instead of the original.

          This is why root CAs are "BAAAAD" as you put it. They can intercept everything.

        • Undoubtedly the reason for installing the cert would be to monitor/filter SSL traffic via a proxy. These days it's quite trivial to setup a transparent proxy that uses a MITM attack with a spoofed cert to monitor your traffic. Have a look at untangle. It does this out of the box. Just put the CA on the client and you can intercept all SSL traffic. Obviously it's not difficult to look at the cert chain to detect this, but even if you do discover a spoofed cert, getting around it isn't trivial.

    • Root CAs can sign anything, you'd still trust it. Certificates for individual services or even a wildcard cert for *.yourschool.com wouldn't be a root CA certificate. They can intercept all your traffic while you are using their network and so can anyone that has hacked them and got access to their private keys. Regardless of the risk (it's not very low usually in schools) they have been eavesdropping on you without telling you and I believe even the UK has privacy laws that explicitly prohibit that.
      Someon
      • by joelleo ( 900926 )

        Root cas can only sign stuff for their own organization, as identified within the certificate. You cannot retroactively sign a cert for https://www.dutchwhizzmandoesn... [dutchwhizz...andssl.com] if that server already has a certificate from a different organization - its existing certificate HAS to chain up to a root - otherwise clients will receive an ssl error. Once the cert is created, the only way to chain it up to a different root ca is to issue it under the new root ca or one of its subordinates, then install that _new_ cert

        • by Richard_at_work ( 517087 ) on Sunday March 09, 2014 @05:04AM (#46438641)

          Your understanding of what is required is a little off - the root CA holder can indeed "retroactively" sign any certificate they want, and your browser would merrily accept such a signed alternative cert without raising any errors because it would never see the original cert. The very act of installing the root CA in the browser allows them to completely replace any other cert signed by any root CA and not cause errors to occur. The only opportunity they would have however to do this would be if they were proxying the traffic between you and the internet.

    • by AmiMoJo ( 196126 ) *

      The other major use for certificates in Windows is installing software and drivers silently without scary warning messages. I'd be more worried about this package that the school makes them install - does it have a backdoor that lets them remotely install other software, or simply spy on the user via screen capture or webcam?

  • You should go read up on the Computer Fraud and Abuse Act. What they did might qualify as a violation of that act, in that they might have been intercepting information w/o knowledge or consent. Having worked with digital certs, I can say that most people, (even tech savvy ones) usually don't understand the first thing about CAs and how they work, so 'accidentally' installing a root CA all over the place sounds like a typical n00b maneuver. Hard to say what their intent was. Further, when they changed the n
  • Just because a root CA is installed doesn't mean someone's spying on you. In order for it to be used, the service in question would have to have a cert signed by it. In order to do pervasive spying, they'd have to have every tls enabled site on the internet complicit in it. They don't. This cert is likely for their own applications/services. WPA2 enterprise mode uses 802.1x which uses certs.. That's probably what it's for. Same if they use 802.1x for wired authentication. If you're worried about snif

    • Those uses would only require a normal CA, a root CA is only needed if you intend to spy on all SSL traffic.

    • by DarkOx ( 621550 )

      No a trusted root is a trusted root, your machine trusts decide for any other site. It's reasonably common for orgs to ask you to install a certificat to trust, so you can authenticate their applicants etc, but that isn't going to be root ca. If someone asks you to install a root, it should raise lots red flags because that really does enable them to impersonate anyone else to you.

  • by fostware ( 551290 ) on Sunday March 09, 2014 @04:52AM (#46438611) Homepage

    a) "we have not signed anything which would excuse it" - you can't. You're not able to sign enforceable legal documents.

    b) "there was a root CA from the school" - it happens due to
            1) WPA-Enterprise and/or NAC relies on keys. Do you use your school credentials for wireless? If so, you require key exchange for it to verify each party.
            2) SSL monitoring systems rely on MITM to read the HOST headers. We couldn't give a rat's arse your bragging about banging Sally, however we do mind that it was to a website called HTTPS://www.breakuprevenge.com and both Sally and yourself are under legal age, it may have included a phone camera image, and it was all posted via the School Internet. Federal, State, and School pastoral care policy issues trump most whiny students objections.

    c) It happens when at the start of the year. I would have twenty staff ask for different packages to be deployed in the first week of school, and your BYOD package may just happened to end up with a testing cert. Once had an antivirus package that hid all toolbars in Word and Excel - that ex-employee never applied a GPO at domain-level again.

    All I'm saying is most school IT departments are asked to perform miracles of pastoral care because parents don't care and Teachers are busy trying to teach. We bare the brunt of school administration trying to enforce pastoral care not just for you, but all those in the school body
    I'm sure if you had brought it to most IT departments attention in a courteous way, you might have been treated better.
    Most schools have a tech-savvy student who is treated like an offsider, as well as one who has joined the Dark Side and ends up on the Watchlist. (yes, I've had "meetings" with Federal Police over a student's actions). Which one will you be?

    • by ruir ( 2709173 )
      There arent technical solutions for political problems.
  • by manu0601 ( 2221348 ) on Sunday March 09, 2014 @05:40AM (#46438727)

    Their intent may be just fine. For instance, you want want to have an internal CA installed so that you can deploy SSL-enabled services without having to buy certificates from a commercial CA.

    Of course it allows SSL traffic interception, which is likely to be illegal, but nothing proves it was done, or even planned. The the real problem here is that the CA framework allows any CA to sign any certificate.

  • certpatrol (Score:5, Interesting)

    by manu0601 ( 2221348 ) on Sunday March 09, 2014 @05:42AM (#46438735)
    If you fear your SSL traffic is intercepted, install a browser extension that track certificate change. Firefox has certpatrol, for instance.
  • Where are all the people who say "it's their network!" when it is snooping in the workplace we are talking about?

    This is a freakin school, which is actually supposed to have a watchful protector role over students. In loco parentis, you know.

    And a couple of humbling observations:

    • You're kids ... honestly, nobody cares enough to snoop on you, except in the most general of policy-ish ways (porn, warez, direct plans to blow people or things up ...).
    • You're kids ... they don't have to give you Internet access a
  • by Bruce66423 ( 1678196 ) on Sunday March 09, 2014 @05:48AM (#46438751)
    Read up your rights under that, especially your right to get all the data that they hold about you for £10. If that data includes the history of your web browsing, then certain consequences follow; make sure you're using a proxy even for innocent activity for a while before you submit the request. On the other hand if it doesn't and they subsequently challenge something that you have posted on line, they will be in BIG trouble for failing to reveal that they knew your browsing history. .

    .

    Assuming you are under 18, your parents' role in this is more significant than yours. If you are over, it gets far more interesting!

  • Normal. (Score:5, Informative)

    by ledow ( 319597 ) on Sunday March 09, 2014 @06:08AM (#46438789) Homepage

    I work in schools.
    I work in UK schools.
    I work in IT in UK schools.

    This is normal. Sorry, but there's nothing shocking here.

    You join our domain, we get the right to push any and all security measures to your client that we deem necessary. If you don't want to allow it, don't join our domain (which also means we probably won't authorise you to use our Internet connection, etc.)

    The domain will have a "Default Domain Policy" that almost certainly includes software you don't want (but we insist you have), settings you'd rather not have (but which we will enforce on you) and things like this - installation of a required domain certificate so we can check your not using OUR SCHOOL FILTER to do illegal / illicit things.

    Chances are if you read your network acceptable usage policy, it states this. The alternative is you don't get network access. Because we are LEGALLY RESPONSIBLE for what is accessed through the network on our network, as well as the protection of our internal data and services.

    Complain all you like. The alternative is that we block SSL site-wide. That means no Facebook at all, by the way. Or GMail. Or Hotmail. Or anything else that uses SSL by default.

    We have a legal duty to monitor, record and analyse the logs of Internet traffic to ensure our child-protection policy (a legally-required policy) is followed. Additionally, it's OUR resource. If you want to use your own external 3G connection on your own time, argue for that. Chances are it will fail.

    If you want to use the SCHOOL connection on SCHOOL time for NON-SCHOOL business, that's not going to happen. However if you want to use it for SCHOOL BUSINESS then you are required to allow us to apply our domain policy. If that, at any particular place, happens to include SSL certificates, monitoring software (potentially even INVISIBLE monitoring software like Securus, Ranger, etc.) then that's what you get.

    Sorry, but as an IT Manager specialising in schools, and working in state, private and boarding schools from primary to further education, this is bog-standard and has happened for years. I believe even places like LGfL (a London-wide, government-backed school IT services supplier) do it.

    There's a reason - we are required to protect our systems and protect ALL the children. That means everything gets summarised, logged and monitored. If we then need to dig into detailed logs, we can enable that option and do that too. Because - as in a previous school I worked for many years ago - we get things like members of staff browsing child pornography on school time. Yes, they are that stupid. And yes, they get caught. And, sorry, but our child-protection and data-protection policies take precedence over you going on your private Facebook after hours and we can't spend the time to distinguish hours, locations, staff-types, etc. for everyone.

    If you don't like it, do not join your computer to a domain. If you are on the domain, it's literally our DOMAIN. Our rules. Clearly stated. That you would have agreed to.

    Please, also don't act like your the first person ever that this has happened to. It's been standard practice for at least the last 15 years I've been working IT in schools in the UK.

    • by ruir ( 2709173 )
      Several questions: - why do children need to connect their *own* notebooks to the school AD? - why we still pretend technology solves political problems? - why give unrestrained access to Internet if the restrictions exist in the first place? - Do you think that with mobile Internet and iPhones technology will solve for long another POLITICAL problem of staff browsing whatever they please at work?
    • Re: (Score:2, Informative)

      by Carewolf ( 581105 )

      Just because it is normal doesn't mean it is legal, and if it is legal it doesn't mean it is right or ethical. In most European countries this would be very illegal.

    • Please, also don't act like your the first person ever that this has happened to. It's been standard practice for at least the last 15 years I've been working IT in schools in the UK.

      Your post is constructive right up to phrase "the last 15 years" which apparently justifies how little your network reveals to the surveilled about the actual extent of the surveillance, even to the point of having software installed that they know little to nothing about on their own equipment that could open back doors to the

  • two points (Score:4, Informative)

    by Tom ( 822 ) on Sunday March 09, 2014 @06:19AM (#46438815) Homepage Journal

    First, a school network is not a public network and it can run any policy it wants, including intercepting and monitoring traffic. You don't have to sign anything, using the network is implicit consent to the rules it is run by. The only legal requirement in my country (so your laws may differ) is disclosure of those rules, you must be able to look them up somewhere.

    Second, regarding danger. The danger is exactly equivalent of the lowest security among the machine(s) that have a copy of the school root certificate (the private key part). If any of them gets compromised and the attacker gets a copy, he can do everything the school does, including interception and manipulation of traffic. If the school rates that as "low", then it assumes that users of the network don't do anything of personal importance, like online banking.

    • First, a school network is not a public network and it can run any policy it wants

      Public has nothing to do with it. Public networks can run any policy they want as well, even public as in government funded ones since those are the only ones that are truly 'public networks'.

      Second, regarding danger. The danger is exactly equivalent of the lowest security among the machine(s) that have a copy of the school root certificate (the private key part). If any of them gets compromised and the attacker gets a copy, he can do everything the school does, including interception and manipulation of traffic.

      No, it isn't. You utterly fail to understand whats going on here or how SSL and PKI in general works.

      The PCs have a copy of the schools PUBLIC CERTIFICATE AUTHORITY KEY installed on them, they DO NOT HAVE THE PRIVATE KEY, and there is no reason any PC should ever hold the root CA private key on a hard disk. I keep m

  • It's their network and they can do what they want with it. Don't want to use it? Tether a smartphone then.
  • Most schools do this and workplaces, my university in the UK included does as well (hoping that banking sites are whitelisted is probably wishful thinking). I'd be very surprised if you are actually able to get your school to change it's practices in the long run.
  • I've never been in a large organization that didn't use their own root CA cert, and I've certainly made sure it was done everywhere I've worked.

    Has nothing to do with pulling a MITM on you. You aren't worth the fucking time and effort, get over yourself, you aren't special, no one cares what you're doing.

    Its more likely they just didn't want to spend several thousand dollars making certs for everything that needs an SSL cert because none of the registered root CAs will let you sign your own domain certs .

"The vast majority of successful major crimes against property are perpetrated by individuals abusing positions of trust." -- Lawrence Dalzell

Working...