If you haven't already done so, read Dan Kaminsky's slides from his
talk at blackhat.  http://www.doxpara.com/DMK_BO2K8.ppt

After he presents the DNS attack, he talks about SSL, certs, and what
browsers must do to get read security against DNS attacks from SSL and
certs.

If you don't have time to read all 107 slides (:-), at least read
slides 63-69, especially 73-79, and 87-89.  61 is important too.

Major takeaways:
1) DV certs' authenticity assurances are worthless in the face DNS attacks
2) Browsers don't yet create adequate distinction between EV and DV certs.
   DV server sites have the same power with a user's browser as EV sites.

Also interesting:
Results attributed to Consumer Reports, showing that the number of
people who ignore bad cert warnings is about equal to the number who
abandon attempts to visit sites because of them.  ~42% +/-1% each!
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to