On Thu, Jan 22, 2009 at 6:05 AM, Ian G <i...@iang.org> wrote:
> On 22/1/09 13:54, Kyle Hamilton wrote:
>>
>> Ian, I'd rather not spell this out, because it's a blueprint that any
>> malicious coder could follow.  Unfortunately, you seem to insist on
>> documentation -- and refuse to accept the word of those who actually
>> do know.  So.
>
>
> Please.... Are you assuming here that we are the repository of all security
> knowledge?  Are you saying that the hackers don't know how to do these
> spoofing attacks?  Are we happy with a security-by-obscurity approach, and
> it is too dangerous for people to really know what's going on?  I've gotta
> trust you?  Because I don't know what I'm talking about, I should be scared?

I'd suggest you drop the argumentum ad absurdum.  This isn't what I'm
stating, and you well know it.  (or you should.  If you don't, you
really shouldn't be taking part in the conversation here.)

Except, of course, the last: because you don't know what you're
talking about, you SHOULD be scared.  If you're really the one who
wrote the financialcryptography site, you should know that all of the
security is only as good as the primitives in use, and the assumptions
inherent in their use.  Two of which are: "keypairs are only as good
as the entropy used to generate them" and "private keys must remain
private".  Without these assumptions, the security of the system
isn't.

The hackers do already know how to do this.  That doesn't mean that I
have to make it easier for people to do it without spending research
time.

And no, I'm not stating that we're the repository of all security
knowledge.  I'm simply stating that those of us who do know how to do
it already know that the "clear and present danger" which you demand
to know about does, truly, already exist.

> It's an MITM, right?  Is there any more to say about implementation that
> changes that?  The current thing we know about the MITM is that it can be
> done via various spoofing tricks (DNS, BGP) from wherever.

Considering that this is THE reason that TLS (along with server
certificates, issued by a third party certifier and with private keys
that are actually private) exists, I'd say it shows that the
assumptions that allow TLS to be considered "secure" are completely
violated in the case of use of poorly-generated random numbers as
seeds for the RSA prime search.

The "clear and present danger" comes in when you think about users who
are using public wi-fi access points.  The danger of spoofing was much
less pronounced when users had to use wired connections, because
they'd typically only use wired connections from hotels, workplaces,
or their home cable/DSL -- and thus had more trust in the legal
protections available because of money changing hands.

> So the site's SSL communications can be MITM'd.  Is that the conclusion?

Not 'the site', but 'any site still using a weakly-generated key'.
And not *can be*, but *have been*.

(Or have you forgotten the case of the girl who accepted all the bogus
certs because she thought that Firefox was screwing up?  That wasn't
quite as sophisticated an attack as I laid out, but if someone can do
the bogus cert thing then they can just as easily extend it to be
undetectable.)

I respectfully suggest that you go back to auditing.  That's really
the only useful input that I've seen you make.  (As it stands right
now, your argument is essentially "since there's no liability,
legally, nobody should bother trying to fix or shore up the current
system, even when the underlying sanity-checks of the system are
violated."  The problem is, regardless of whether there's liability,
THIS IS THE ONLY THING THAT THE USERS HAVE.  If you want to design
something better, do so, then propose it to the standards bodies.)

-Kyle H
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to