Ian G wrote:
Thing is, client certs is one of the few bright spots in security,
looking forward.  They remove the passwords from the equation.  This
forces that phisher-attacker into the "real-time MITM" space instead of
the "lazy-time MITM space".

No, you're wrong Ian, it's much stronger than that.

When the server checks the client cert, he knows he really has that a direct link to the owner of that private key and there's no MITM at the network level.

If client certs are used, the attacker can do MITM only if he :
- steals the private key of the client
- compromises his browser (and if he does the second, he probably can do the first. But if the key is inside a smart card, it makes sense to start doing it with a patched browser)

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to