On 2010-02-20 08:46 PST, Nguyễn Đình Nam wrote:
[yet another promotion of "perspectives"]

Questions/issues:

1. How do you secure the connection to the perspectives server?
   (This is a recursive problem)

2. How do you avoid false reports for the multiple servers that legitimately
claim to be the same server (same DNS name) in a content distribution
network (e.g. akamai)?

3. This scheme doesn't help when the MITM places himself close to the server
under attack (e.g. the server's ISP), such that all the clients everywhere
(except at the server's own point of presence) see the attacker's MITM'ed
cert chain.   Isn't that a likely scenario for attacks in situations where
the ISP is controlled by the hostile party?


-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to