Gervase Markham wrote, On 2008-08-21 05:09: > Nelson Bolyard wrote: >> If you haven't already done so, read Dan Kaminsky's slides from his >> talk at blackhat. http://www.doxpara.com/DMK_BO2K8.ppt >> >> After he presents the DNS attack, he talks about SSL, certs, and what >> browsers must do to get read security against DNS attacks from SSL and >> certs. >> >> If you don't have time to read all 107 slides (:-), at least read >> slides 63-69, especially 73-79, and 87-89. 61 is important too. >> >> Major takeaways: >> 1) DV certs' authenticity assurances are worthless in the face DNS attacks >> 2) Browsers don't yet create adequate distinction between EV and DV certs. >> 3) DV server sites have the same power with a user's browser as EV sites. > > 4) The fact of 1), combined with the fact that we backed down on making > sites have to be EV-only (which Opera tried, but other brower vendors > decided not to do) means that EV protection could have been compromised.
I don't follow that. Does "we backed down on making sites have to be EV-only" mean "we continue to show SSL chrome indicators for DV sites"? > And further vulnerabilities of this sort would reopen the same hole. > > In other words, the security of EV currently depends on the security of > the DNS. This is bad. I don't follow. Please elaborate. Dan also argued that EV chrome displays do not really offer the strong identity assurances that EV claims to offer, but I understood his argument to be that browsers are vulnerable to attack from plugins/extensions that can raise EV chrome for sites that shouldn't get it. /Nelson _______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto