On 09/19/2008 01:03 AM, Kyle Hamilton:
> Mary and Mallory may not be the same control.
>
> Mary has a site with a cert with AIA.  Mallory can take control over
> that location for the AIA, without Mary being able to do a thing to
> stop it.
>

Mary knows that she has a cert, because she installed it. If the cert is 
from a CA, than the CA knows about that Alice visited Mary already by 
other means (CRL,OCSP).

Supposed Mallory isn't the CA and has no control over Mary, than Mallory 
has perhaps control (by whatever means) over the DNS server Alice is 
using. Now the CA issuer URL of the AIA extension of the cert installed 
at Mary will point to a different IP instead of that of the CA. Now 
Mallory knows that Alice (and whoever else) visited Mary. But wait, he 
can do the same with the CLR DP and OCSP URL. The CA Issuer URL doesn't 
introduce anything new here.

However in all those cases, the connection to the secured site of Mary 
may not succeed because

- the issuer certificate doesn't validate to a trusted root
- the CRL isn't valid
- the OCSP response is certainly not valid

Now Alice might realize that maybe something isn't quite right. However 
in any of the cases above there is no vulnerability - there might be a 
problem in case the DNS is poisoned and Alice reveals unwillingly that 
she tried to visit Mary. There is a big difference!

Now the impact of that scenario is by far, far smaller than some want us 
to believe. In any case, the CA Issuer and fetching of the certificate 
doesn't introduce ANYTHING new - otherwise get rid of CRL and OCSP 
checking as well. It's the same attack vector.


-- 
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to