Nelson B Bolyard wrote, On 2008-08-21 10:04:
> Gervase Markham wrote, On 2008-08-21 05:09:
>> Nelson Bolyard wrote:
>>> If you haven't already done so, read Dan Kaminsky's slides from his
>>> talk at blackhat.  http://www.doxpara.com/DMK_BO2K8.ppt
>>>
>>> After he presents the DNS attack, he talks about SSL, certs, and what
>>> browsers must do to get read security against DNS attacks from SSL and
>>> certs.
>>>
>>> If you don't have time to read all 107 slides (:-), at least read
>>> slides 63-69, especially 73-79, and 87-89.  61 is important too.
>>>
>>> Major takeaways:
>>> 1) DV certs' authenticity assurances are worthless in the face DNS attacks
>>> 2) Browsers don't yet create adequate distinction between EV and DV certs.
>>> 3)  DV server sites have the same power with a user's browser as EV sites.
>> 4) The fact of 1), combined with the fact that we backed down on making
>> sites have to be EV-only (which Opera tried, but other brower vendors
>> decided not to do) means that EV protection could have been compromised.
> 
> I don't follow that.  Does "we backed down on making sites have to be
> EV-only" mean "we continue to show SSL chrome indicators for DV sites"?

I was informed privately that it means that Firefox shows EV chrome
indicators, even for pages that contain some DV content.

>> And further vulnerabilities of this sort would reopen the same hole.
>>
>> In other words, the security of EV currently depends on the security of
>> the DNS. This is bad.

I agree that DV content in EV pages is just as dubious as any other DV
content.  I would favor that EV pages must have all EV content to show EV
chrome, just as SSL pages must have all SSL content to show (normal) SSL
chrome.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to