Nelson Bolyard wrote:
> If you haven't already done so, read Dan Kaminsky's slides from his
> talk at blackhat.  http://www.doxpara.com/DMK_BO2K8.ppt
> 
> After he presents the DNS attack, he talks about SSL, certs, and what
> browsers must do to get read security against DNS attacks from SSL and
> certs.
> 
> If you don't have time to read all 107 slides (:-), at least read
> slides 63-69, especially 73-79, and 87-89.  61 is important too.
> 
> Major takeaways:
> 1) DV certs' authenticity assurances are worthless in the face DNS attacks
> 2) Browsers don't yet create adequate distinction between EV and DV certs.
> 3)  DV server sites have the same power with a user's browser as EV sites.

4) The fact of 1), combined with the fact that we backed down on making
sites have to be EV-only (which Opera tried, but other brower vendors
decided not to do) means that EV protection could have been compromised.
And further vulnerabilities of this sort would reopen the same hole.

In other words, the security of EV currently depends on the security of
the DNS. This is bad.

Gerv
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to