* Eddy Nigg:

> On 12/27/2008 05:38 PM, Florian Weimer:
>>> Isn't that, by itself, a very good reason to take immediate action?
>>> Security should be default-fail rather than default-pass.
>>
>> This is not about security, this is about the presence or absence of
>> an obscure browser warning.
>
> Huuu? Have you understood the issue at all?

I think so.

> I'm not sure...however it's not about browser warnings. This is
> about security proper.

As a downstream distributor of Mozilla code, I'd hate to roll out
updates (especially security updates) just because CAs start to play
games with each other.  This is not about "security proper".  You're
trying to pull us into a PR attack on one of your competitors, thereby
willingly reducing confidence in ecommerce.  (I'm exaggerating a bit,
of course.)

> Or how else would you explain an MITM attack?

If users edit /etc/hosts to complete the attack, it's their fault.

Even if you've got the certificate, you need to attack IP routing or
DNS.  If you can do that, chances are that you can mount this attack
against one of the domain-validating RAs, and still receive a
certificate.  So the browser PKI is currently irrelevant for practical
purposes (beyond CA revenues and giving users a warm, fuzzy feeling),
even if everybody follows established RA procedures.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to