Gervase Markham wrote, On 2008-08-21 05:09:
> Nelson Bolyard wrote:
>> If you haven't already done so, read Dan Kaminsky's slides from his
>> talk at blackhat.  http://www.doxpara.com/DMK_BO2K8.ppt
>>
>> After he presents the DNS attack, he talks about SSL, certs, and what
>> browsers must do to get read security against DNS attacks from SSL and
>> certs.
>>
>> If you don't have time to read all 107 slides (:-), at least read
>> slides 63-69, especially 73-79, and 87-89.  61 is important too.
>>
>> Major takeaways:
>> 1) DV certs' authenticity assurances are worthless in the face DNS attacks
>> 2) Browsers don't yet create adequate distinction between EV and DV certs.
>> 3)  DV server sites have the same power with a user's browser as EV sites.
> 
> 4) The fact of 1), combined with the fact that we backed down on making
> sites have to be EV-only (which Opera tried, but other brower vendors
> decided not to do) means that EV protection could have been compromised.

I don't follow that.  Does "we backed down on making sites have to be
EV-only" mean "we continue to show SSL chrome indicators for DV sites"?

> And further vulnerabilities of this sort would reopen the same hole.
> 
> In other words, the security of EV currently depends on the security of
> the DNS. This is bad.

I don't follow.  Please elaborate.

Dan also argued that EV chrome displays do not really offer the strong
identity assurances that EV claims to offer, but I understood his argument
to be that browsers are vulnerable to attack from plugins/extensions that
can raise EV chrome for sites that shouldn't get it.

/Nelson
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to