On 19/2/09 16:39, Benjamin Smedberg wrote:

http://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf

Other than this specific attack, what are the concerns about wildcards that
would make us take such a drastic action?

It sounds to me that we could and should fix this bug simply by disabling
punycode for the wildcard portion.


The issue is one of cross-area complexity. Punycode is "powerful" and so is wildcards. By themselves, they are ok, and they work "on paper". But when you combine them, there are possible weird interactions. As the paper showed, there are ways in which you can combine these things to create a good attack.

To a large extent, there may be some merit in establishing a principle or criteria, such as Eddy is pointing towards:

   * powerful features are only available to well-verified people.

      + wildcards
      + punycode
      + codesigning

(That's just a hypothetical.)



iang
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to