> I think e.kabarie is concerned with attacks that would inject bogus CA
> certs into the client's cert DB and mark them as trusted.
>

Yes! That's exactly the thing...

> E.Kabarie:
>
> The difficulty with your problem statement is that it lacks a threat
> model.  You seem to suggest that an attacker would have unlimited
> access and control to the system under attack.  If we are to suppose
> that the persons who will be relying on this machine have NO control
> over it, and no ability to stop third parties to making any changes
> they wish to the system, then of course there is no sense in which
> anything we can do can provide those users with security.
>

Well!!! What if a cracker somehow got access to the files.... Say he
got the IP of the sys admin's node while the latter was happily
chatting away with him(masquerading as a hazel-eyed blonde.. ;-))...
It is not a supremely difficult task to break into a system: we all
know that... And considering the value of secret data that SSL often
securely communicates, it is worth much more than the needed effort
for any mailicious cracker.... Once in, the cracker first cracks the
database as I explained, then "hijacks" the victim company's gateway
IP(blocking them out & redirecting the incoming traffic to wherever he
wants it...) Now he can "securely communicate" with all the company's
client's/service providers.... :-))

I'm not much of a security buff; only a novice.... But hope this will
come close to a possible threat scenario...!!!

> If the attacker can replace or modify any of the DB files upon which
> FireFox relies, then the attacker can also replace the FireFox
> executables themselves.  Any countermeasures we might put into FireFox
> could be undone by the attacker simply by replacing the "normal"
> FireFox with one that the attacker has modified and built himself.
>

I never said so... Infact, I had wanted to implement something similar
to the browser's security mechanism and had asked for links providing
details about the certificate management architecture....

> All the crypto-based security solutions such as SSL and S/MIME exist to
> provide security over insecure channels between two users' systems at two
> endpoints.  The assumption is that each user controls his own system.
> SSL and S/MIME are not trying to solve problems where the user's own
> system is insecure, but rather are trying to establish secure communications
> between two secured systems over an intervening network
> that is insecure and may be hostile.  At each end of the communications
> channel, there must exist a boundary point (or line), formally known as
> a security perimeter, such that everything between that point and the user
> is known to be controlled by and trustable by the user.  The bounary line
> separates that with the user can trust from that which is hostile.
>
> When a user's local computer system is not under his control, and may be
> compromised, the user must regard that system as being outside of his
> security permiter, part of the insecure and hostile channel through which
> his communications may travel.  Tamper proof crypto hardware, such as
> the devices that Arshad suggested, recognize thatt the security perimeter
> may be between the user and his local system.  Those security devices
> logically exist within the user's perimeter, being something that the user
> can control and trust, even when he cannot control and trust his computer
> system.
>

I know what you're talking about... I'm only saying that the
certificate database be "DISCREET", not an openly accesible entity....
Arshad did suggest a good way to do so... but I don't wish to force it
upon every client to have such an arrangement... I want to sort
of ..build it INTO the application... So that the people looking to
incorporate "my exploit" 8-) remain at a loss....!! :-)

> I think you're trying to devise a means by which the user can trust his
> system software and files on a potentially compromised system.  That's
> simply infeasible on common personal computers today.
>
> /Nelson

Yes!! That's right: we cannot perhaps build a "truly secure"
computer... Security is relative to the threat posed...But at some
places it might just be enough to not trust even the network admin!!!
But what's the fault in trying....?? If the thing is built-in and they
don't have the source code.... I can atleast make them work harder for
their "prized catch"!!! Reverse engineer the whole thing first, then
see if you can crack it...!!!! :-)) Isn't THIS what SSL(any
cryptography for that matter...) is based upon...making them work
harder for their prize...????

Warm Regards,
D3|\||\|!$
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to