Re: Full Disclosure!

2009-02-05 Thread Eddy Nigg
On 02/05/2009 08:36 PM, Gervase Markham: Eddy: I don't think Frank is saying that you made the _same_ mistakes as CertStar (out-sourcing validation etc. etc.), but that you made _a_mistake_, just like they did. He then goes on to make the point that making a mistake is not the end of the world.

Re: Full Disclosure!

2009-02-05 Thread Gervase Markham
Eddy Nigg wrote: >> So IMO you get points for prompt disclosure and fixes, but in the end >> you messed up just like Comodo and CertStar did. > > Nonono :-) > > I see the main differences as followed and I believe the main > differences are policy wise (and allow me to comment on this since you >

Re: Full Disclosure!

2009-02-05 Thread Eddy Nigg
On 02/04/2009 08:27 PM, Frank Hecker: 2. I understand that what happened in the case of StartCom was not exactly the same as what happened in the case of Comodo/CertStar. However it's part of web security basics to assume that whatever a client sends to a server is untrusted and must be (re)verif

Re: Full Disclosure!

2009-02-04 Thread Frank Hecker
Eddy Nigg wrote: On 01/03/2009 05:38 AM, Eddy Nigg: Before anybody else does, I prefer from posting it myself :-) http://blog.phishme.com/2009/01/nobody-is-perfect/ http://schmoil.blogspot.com/2009/01/nobody-is-perfect.html For the interested, StartCom is currently checking if I can release ou

Re: Proposal to split this list (was: Re: Full Disclosure!)

2009-01-05 Thread Paul Hoffman
At 1:35 PM -0800 1/5/09, Wan-Teh Chang wrote: >On Sun, Jan 4, 2009 at 12:32 PM, Paul Hoffman wrote: >> >> I propose that Mozilla form a new mailing list, dev-policy-trustanchors. The >> topics for that list would include: >> >> - All new trust anchors being added to the Mozilla trust anchor pile

Re: Proposal to split this list (was: Re: Full Disclosure!)

2009-01-05 Thread Wan-Teh Chang
On Sun, Jan 4, 2009 at 12:32 PM, Paul Hoffman wrote: > > I propose that Mozilla form a new mailing list, dev-policy-trustanchors. The > topics for that list would include: > > - All new trust anchors being added to the Mozilla trust anchor pile > - Proposals for changes to the Mozilla trust ancho

Re: Full Disclosure!

2009-01-05 Thread Eddy Nigg
On 01/05/2009 06:44 PM, Paul Hoffman: At 6:08 PM +0200 1/5/09, Eddy Nigg wrote: Therefor we can't lump just all failures together and as you correctly stated, there is no clear line between one and the other. This is what I was saying. What you said was "As I see it, our case indeed was a bug

Re: Full Disclosure!

2009-01-05 Thread Paul Hoffman
At 6:08 PM +0200 1/5/09, Eddy Nigg wrote: >Therefor we can't lump just all failures together and as you correctly stated, >there is no clear line between one and the other. This is what I was saying. What you said was "As I see it, our case indeed was a bug, the Comodo case was negligence". That

Re: Full Disclosure!

2009-01-05 Thread Eddy Nigg
On 01/05/2009 04:56 PM, Gervase Markham: I am not saying the two incidents were the same - I think every incident has to be assessed individually. I am just saying that you cannot make such a division so quickly and easily. Not quickly and easily - agree on that. And every incident needs to a

Re: Full Disclosure!

2009-01-05 Thread Gervase Markham
Eddy Nigg wrote: > As I see it, our case indeed was a bug, the Comodo case was negligence. There is no clear line between one and the other. You are saying the Comodo case was negligence because the bug was so obvious that they should have spotted it. But the obviousness of bugs is a gradated scal

Proposal to split this list (was: Re: Full Disclosure!)

2009-01-04 Thread Paul Hoffman
At 12:11 AM +0100 1/4/09, Jan Schejbal wrote: >>Why is this relevant to this mailing list? > >Because there was a security failure in one of the Firefox trusted CAs >allowing anyone to get fake certificates. This event and the reaction of the >CA are important to determine if the CA is (still) tr

Re: Full Disclosure!

2009-01-03 Thread Eddy Nigg
On 01/04/2009 12:46 AM, Nelson B Bolyard: Eddy Nigg wrote, On 2009-01-03 14:25: On 01/03/2009 11:54 PM, Nelson B Bolyard: Eddy Nigg wrote, On 2009-01-03 11:03: On 01/03/2009 09:03 PM, Nelson B Bolyard: I hate to say it, but it's possible for the browser user to change those values without eit

Re: Full Disclosure!

2009-01-03 Thread Jan Schejbal
Why is this relevant to this mailing list? Because there was a security failure in one of the Firefox trusted CAs allowing anyone to get fake certificates. This event and the reaction of the CA are important to determine if the CA is (still) trustworthy. It's the same as the Commodo thing. Ju

Re: Full Disclosure!

2009-01-03 Thread Eddy Nigg
On 01/03/2009 11:59 PM, Nelson B Bolyard: As I understand it, Eddy, the situation with CertStar was a bug which caused the code to simply fail to invoke the facilities that do the DV validation (or verification, or whatever the right term is for that). If that were correct, just a walk-through

Re: Full Disclosure!

2009-01-03 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2009-01-03 14:25: > On 01/03/2009 11:54 PM, Nelson B Bolyard: >> Eddy Nigg wrote, On 2009-01-03 11:03: >>> On 01/03/2009 09:03 PM, Nelson B Bolyard: I hate to say it, but it's possible for the browser user to change those values without either (a) modifying the browser

Re: Full Disclosure!

2009-01-03 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2009-01-03 13:38: > On 01/03/2009 11:33 PM, Nelson B Bolyard: >>> Additionally all steps of the subscribers are always logged (yes, every >>> click of it) and we have records about every validation and about which >>> email address was used for it, failed attempts etc. With thos

Re: Full Disclosure!

2009-01-03 Thread Eddy Nigg
On 01/03/2009 11:54 PM, Nelson B Bolyard: Eddy Nigg wrote, On 2009-01-03 11:03: On 01/03/2009 09:03 PM, Nelson B Bolyard: I hate to say it, but it's possible for the browser user to change those values without either (a) modifying the browser or (b) using some proxy tool. I don't know another

Re: Full Disclosure!

2009-01-03 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2009-01-03 11:01: > On 01/03/2009 06:16 PM, Ben Bucksch: >> Yes, that would have been incredibily stupid, >> but given what we learned recently about some other CAs... This bug is >> not too far from that, but at least not that obviously stupid, it can >> really have been just

Re: Full Disclosure!

2009-01-03 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2009-01-03 11:03: > On 01/03/2009 09:03 PM, Nelson B Bolyard: >> I hate to say it, but it's possible for the browser user to change those >> values without either (a) modifying the browser or (b) using some proxy >> tool. > > I don't know another way, but I'm glad to learn how.

Re: Full Disclosure!

2009-01-03 Thread Eddy Nigg
On 01/03/2009 11:33 PM, Nelson B Bolyard: Additionally all steps of the subscribers are always logged (yes, every click of it) and we have records about every validation and about which email address was used for it, failed attempts etc. With those records could we re-validate all certificates ve

Re: Full Disclosure!

2009-01-03 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2009-01-02 22:18: > [...] The flaw was, that insufficient verification of the response at > the server side was performed, allowing him to validate the domain by > using a different email address than the validations wizard actually > provided. [...] > > Additionally all ste

Re: Full Disclosure!

2009-01-03 Thread Eddy Nigg
On 01/03/2009 10:03 PM, Ben Bucksch: On 03.01.2009 20:01, Eddy Nigg wrote: the other layers of defense Please don't call the blacklist a real "layer of defense". If he didn't try to get a cert for paypal.com, it would have worked. All layers failed. Please be honest enough to yourself to admit

Re: Full Disclosure!

2009-01-03 Thread Ben Bucksch
On 03.01.2009 20:03, Eddy Nigg wrote: On 01/03/2009 09:03 PM, Nelson B Bolyard: I hate to say it, but it's possible for the browser user to change those values without either (a) modifying the browser or (b) using some proxy tool. I don't know another way, but I'm glad to learn how. You can

Re: Full Disclosure!

2009-01-03 Thread Ben Bucksch
On 03.01.2009 20:01, Eddy Nigg wrote: the other layers of defense Please don't call the blacklist a real "layer of defense". If he didn't try to get a cert for paypal.com, it would have worked. All layers failed. Please be honest enough to yourself to admit that, so that you can try to find

Re: Full Disclosure!

2009-01-03 Thread Eddy Nigg
On 01/03/2009 09:03 PM, Nelson B Bolyard: I hate to say it, but it's possible for the browser user to change those values without either (a) modifying the browser or (b) using some proxy tool. I don't know another way, but I'm glad to learn how. So let me ask: Did Mike Zusman confirm that he

Re: Full Disclosure!

2009-01-03 Thread Eddy Nigg
On 01/03/2009 06:16 PM, Ben Bucksch: Yes, that is (just?) a bug. It does mean that a developer didn't think correctly - it's a general rule in security to validate all input, distrust all other parties, and this was not done here. Correct. Actually it was done, but something in the verificatio

Re: Full Disclosure!

2009-01-03 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2009-01-02 22:18: > The attack was performed by using said tool above or by using a modified > version of the browser. By hooking this tool between the server and > browser, the tool allows to change the values coming to and from the > browser. I hate to say it, but it's p

Re: Full Disclosure!

2009-01-03 Thread Daniel Veditz
Paul Hoffman wrote: > Why is this relevant to this mailing list? Doesn't it go along with the other "are CA's trustworthy?" threads? ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Fully open operation (was: Full Disclosure!)

2009-01-03 Thread Ben Bucksch
On 03.01.2009 16:48, Eddy Nigg wrote: ...I wouldn't be willing to disclose each and every detail of code, preventive measures, controls and procedures and possible events. Well, I think this might be a good idea, though. I could even go so far as to demand that all operations of the CA, includ

Re: Full Disclosure!

2009-01-03 Thread Ben Bucksch
On 03.01.2009 07:18, Eddy Nigg wrote: The validations wizard allows for a selection of a few possible email addresses considered for administrative purpose or as listed in the whois records of the domain name. The flaw was, that insufficient verification of the response at the server side was p

Re: Full Disclosure!

2009-01-03 Thread Paul Hoffman
Why is this relevant to this mailing list? --Paul Hoffman ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Full Disclosure!

2009-01-03 Thread David E. Ross
On 1/3/2009 6:43 AM, Ian G wrote: > On 3/1/09 04:38, Eddy Nigg wrote: >> Before anybody else does, I prefer from posting it myself :-) >> >> http://blog.phishme.com/2009/01/nobody-is-perfect/ >> http://schmoil.blogspot.com/2009/01/nobody-is-perfect.html >> >> For the interested, StartCom is current

Re: Full Disclosure!

2009-01-03 Thread Eddy Nigg
On 01/03/2009 04:43 PM, Ian G: What incentive exists for a CA in disclosing an apparent weakness? Quite frankly, none. We've seen both sides over the last 2-3 weeks. Not entirely correct...but... So I guess there are two questions: 1. do we want to live in the world of open disclosure

Re: Full Disclosure!

2009-01-03 Thread Ian G
On 3/1/09 04:38, Eddy Nigg wrote: Before anybody else does, I prefer from posting it myself :-) http://blog.phishme.com/2009/01/nobody-is-perfect/ http://schmoil.blogspot.com/2009/01/nobody-is-perfect.html For the interested, StartCom is currently checking if I can release our internal "critica

Re: Full Disclosure!

2009-01-02 Thread Eddy Nigg
On 01/03/2009 07:31 AM, Ben Bucksch: On 03.01.2009 04:59, Eddy Nigg wrote: The report is available from here: https://blog.startcom.org/?p=161 That's surely interesting, but the report does not contain any details of interest. It only says "The attack ... involved proxying ,intercepting all c

Re: Full Disclosure!

2009-01-02 Thread Ben Bucksch
On 03.01.2009 04:59, Eddy Nigg wrote: The report is available from here: https://blog.startcom.org/?p=161 That's surely interesting, but the report does not contain any details of interest. It only says "The attack ... involved proxying ,intercepting all communication from and to the browse

Re: Full Disclosure!

2009-01-02 Thread Eddy Nigg
On 01/03/2009 05:38 AM, Eddy Nigg: Before anybody else does, I prefer from posting it myself :-) http://blog.phishme.com/2009/01/nobody-is-perfect/ http://schmoil.blogspot.com/2009/01/nobody-is-perfect.html For the interested, StartCom is currently checking if I can release our internal "critic

Full Disclosure!

2009-01-02 Thread Eddy Nigg
Before anybody else does, I prefer from posting it myself :-) http://blog.phishme.com/2009/01/nobody-is-perfect/ http://schmoil.blogspot.com/2009/01/nobody-is-perfect.html For the interested, StartCom is currently checking if I can release our internal "critical event report" of this event to t

Re: [Full-disclosure] Firefox 2.0.x: tracking unsuspecting users using TLS client certificates

2007-09-10 Thread niclas
> ... I realised that you can do something with Firefox 2.0.x that > you could not do with Firefox 1.5.x: track an unsuspecting user > using TLS client certificates. this is not new. in a way it has been in the apache documentation for years. it simple, and it's very bad: a) firefox does not ask

Re: [Full-disclosure] Firefox 2.0.x: tracking unsuspecting users using TLS client certificates

2007-09-09 Thread Peter Besenbruch
Brendan Dolan-Gavitt wrote: > Can anyone see if this works through Privoxy and the other things in the > standard Tor bundle? It works with Tor with, and without Privoxy. -- Hawaiian Astronomical Society: http://www.hawastsoc.org HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky __

Re: [Full-disclosure] Firefox 2.0.x: tracking unsuspecting users using TLS client certificates

2007-09-09 Thread Erik Tews
Am Freitag, den 07.09.2007, 10:04 -0400 schrieb Arshad Noor: > Alex, > > Do you presume that the websites in the domains that you intend > to track users will install the self-signed CA certificate that > issued the client-certificate to the unsuspecting user? If not, > how will the browser know

Re: [Full-disclosure] Firefox 2.0.x: tracking unsuspecting users using TLS client certificates

2007-09-09 Thread Brendan Dolan-Gavitt
it... > > -- > Regards Signer: Eddy Nigg, StartCom Ltd. <http://www.startcom.org> > Jabber: [EMAIL PROTECTED] Blog: Join the > Revolution!<http://blog.startcom.org> > Phone: +1.213.341.0390 > > __