On 2014-05-30 12:53 PM, Gervase Markham wrote:
On 29/05/14 07:01, Mike Hoye wrote:
It's become clear in the last few months that the overwhelmingly most
frequent users of MITM attacks are state actors with privileged network
positions either obtaining or coercing keys from CAs,

I don't think that's clear at all. Citation needed.

I think it's more likely that they are intercepting SSL using crypto or
implementation vulnerabilities without explicit CA cooperation.

A colleague of mine at CMU just published a paper on exactly this question: https://www.linshunghuang.com/papers/mitm.pdf

One-sentence summary: the most frequent sources of MITM attacks on HTTPS connections *specifically to Facebook* are (a) locally installed malware, (b) institutional transparent proxies for virus scanning, Internet "filtering", and so on.

Nothing was detected that was obviously, or even plausibly, an attack by a state surveillance agency, although (if they do do this) one would hope they are at least competent enough to not make it obvious.

----

Reading through the whole discussion, it sounds to me like TOFU + pinning (this exact cert chain is trusted only for this specific host) would be a reasonable short-term solution for existing email servers with self-signed certificates. I don't have any better ideas for the long term, but maybe we should reach out to the owncloud, Mailpile, etc. developers and talk to them about what *they* see as an ideal solution. (Mailpile especially has people on staff who care deeply about UX.)

zw
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to