Kyle,

Kyle Hamilton wrote:
> Mary and Mallory may not be the same control.
> 
> Mary has a site with a cert with AIA.  Mallory can take control over
> that location for the AIA, without Mary being able to do a thing to
> stop it.

If Mallory was able to replace Mary's cert with a fake one, then they 
effectively have control already, and they might as well save themselves 
the trouble and just download Mary's server log file. It will be much 
more discreet, and less trouble.

The other case is an MITM . Mallory is intercepting Mary's incoming 
connections somehow, and sending their own fake cert (MITM) with an AIA, 
that phones back home. However in that case, why bother even phoning 
back home ? Mallory is in the middle, and already knows that Alice is 
trying to connect to Mary.

It's a little hard to see what Mallory is gaining from using an AIA that 
they can't already get by other means.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to