Gervase Markham:
>
> Exactly my point. If the CA's DNS is secure, the EV system is safe. If
> it's not, it's not. So the two are linked, and they shouldn't be.

I think you meant DV, not EV here...

>
> Note I wasn't specifically talking about this attack, which the CAs may
> well have patched against. My point is that if another vulnerability in
> DNS permitting spoofing is discovered, then EV is at risk - i.e. there
> is a link between the security of the two things.
>

Again, CAs have other/more requirements unlike John's DNS server...the 
security strategy of a CA should make a difference, otherwise they 
shouldn't play CA. CAs issuing DV certs have perhaps even an added 
burden in this respect.

However with EV (and other validated certificates) it's highly unlikely 
that the subscriber would even attempt to get a certificate for a domain 
over which he shouldn't have any control.

In any case SSL certificates are here to protect against DNS 
vulnerabilities and not as you stated.

>
> The weakness is that the CA's DNS server could be poisoned to allow the
> attacker to intercept their communications (e.g. email) with the target
> domain, and thereby obtain a DV certificate for it fraudulently.
>

See above...

> The result is that a mixed EV+DV page can be compromised if there is an
> ability to hijack DNS.

EV shouldn't be vulnerable to DNS poisoning of the CA DNS servers, 
otherwise what would we have gained by it? Isn't EV all about the 
EXTENDED validation, which includes domain control?

> Which is why I said the security of the two
> systems is currently linked. We can eliminate the link by requiring all-EV.

Yes, this is a good thing to do! As Nelson pointed out, when visiting an 
EV site, I want to be assured that there are no other parties 
listening...For example Google Analitics is JavaScript code. In that 
code - or any other code included by a third party, it would be fairly 
easy to snoop for credit card and other details...


-- 
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to