Arshad Noor wrote, On 2008-02-06 06:38: > The issue isn't with certificates; it is with private keys.
Arshad, I think e.kabarie is concerned with attacks that would inject bogus CA certs into the client's cert DB and mark them as trusted. E.Kabarie: The difficulty with your problem statement is that it lacks a threat model. You seem to suggest that an attacker would have unlimited access and control to the system under attack. If we are to suppose that the persons who will be relying on this machine have NO control over it, and no ability to stop third parties to making any changes they wish to the system, then of course there is no sense in which anything we can do can provide those users with security. If the attacker can replace or modify any of the DB files upon which FireFox relies, then the attacker can also replace the FireFox executables themselves. Any countermeasures we might put into FireFox could be undone by the attacker simply by replacing the "normal" FireFox with one that the attacker has modified and built himself. All the crypto-based security solutions such as SSL and S/MIME exist to provide security over insecure channels between two users' systems at two endpoints. The assumption is that each user controls his own system. SSL and S/MIME are not trying to solve problems where the user's own system is insecure, but rather are trying to establish secure communications between two secured systems over an intervening network that is insecure and may be hostile. At each end of the communications channel, there must exist a boundary point (or line), formally known as a security perimeter, such that everything between that point and the user is known to be controlled by and trustable by the user. The bounary line separates that with the user can trust from that which is hostile. When a user's local computer system is not under his control, and may be compromised, the user must regard that system as being outside of his security permiter, part of the insecure and hostile channel through which his communications may travel. Tamper proof crypto hardware, such as the devices that Arshad suggested, recognize thatt the security perimeter may be between the user and his local system. Those security devices logically exist within the user's perimeter, being something that the user can control and trust, even when he cannot control and trust his computer system. I think you're trying to devise a means by which the user can trust his system software and files on a potentially compromised system. That's simply infeasible on common personal computers today. /Nelson _______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto