On 2/19/09 9:37 AM, Eddy Nigg wrote:
> On 02/19/2009 03:30 PM, Jean-Marc Desperrier:
>> Moxie Marlinspike in Black Hat has just demonstrated a very serious i18n
>> attack using a *.ijjk.cn certificate.
>>
>> http://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf
>>
>> .cn is authorized for i18n, and the * will match anything, allowing all
>> the classic i18n based attacks.
>>
> This was striking:
> 
> Get a domain-validated SSL wildcard cert for *.ijjk.cn
> 
>> So what the proper immediate/long term solution ? Disable punycode for
>> the wildcard part of certificates ?
> 
> Disallow domain validated wild card certificates. Make identity
> validation a requirement, same as with code signing. It has been said
> over and over again, not just by chance.

Other than this specific attack, what are the concerns about wildcards that
would make us take such a drastic action?

It sounds to me that we could and should fix this bug simply by disabling
punycode for the wildcard portion.

--BDS
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to