On Thu, Oct 8, 2009 at 1:30 PM, Daniel Veditz <dved...@mozilla.com> wrote:
>
> Needless to say what you're proposing can't be called "SSL" anymore and
> there are sound security reasons SSL does not work that way. Using such a
> client to connect to commercial, financial, or government sites would be
> profoundly dangerous.

The first sentence of this statement is completely incorrect.  The
second sentence of this statement is only correct to the extent that
an unauthenticated connection does not perform a renegotiation with a
provided certificate.  (There are some extremely good reasons to allow
this situation, and every session that includes a DHE component
performs essentially the same thing without hiding the contents of the
certificate from non-active attackers -- which might be necessary in
certain circumstances and policies.)

SSLv2, SSLv3, and all versions of TLS have allowed for a
non-authenticated mode.  The only restriction is that a server which
does not provide a certificate is not allowed to ask the client to
provide a certificate.  (This is a policy requirement encoded into the
standard.  I believe that the community would be better served if the
language should be removed, especially as other protocols -- like the
ipsec suite -- do not require the server to identify itself until it
receives a request with a valid certificate.)

As well, it is entirely possible to authenticate someone using
other-than-cryptographic means across any SSL/TLS connection that does
not use certificate-based authentication.  (Look at
http://zfoneproject.com/ for one example of this, and
http://cypherpunks.ca/otr/ for another.)  Various proposals for
extension of TLS to allow one-time passwords and such (as a means of a
pre-shared authenticator) have been made, and all suffer from various
flaws.  The only thing that all servers can currently support is an
unauthenticated handshake, followed by a renegotiation where it
actually authenticates.  (Even SSLv2 servers could do this, but that
protocol's obsolete for very good security-related reasons.)

-Kyle H
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to