Thanks,

I still couldn't find any real technical detail, but your explanation is
mostly correct. One learns something every day.

Netscape and MS appear to support "step-up" or "server gated"
cryptography. Presumably any browser could (or they could have just not
export crippled themselves in the first place). MS tries to take credit
for it, but the history is unclear in the quick search I performed.

I found indications from several digital certificate vendors that they
can provide certs with support for this "step-up" crypto, so Verisign is
not unique in that respect. I also confirmed that Apache can indeed
support it.

Protocol-wise the old export-controlled browsers are deliberately broken
to not negotiate higher than export strength ciphers. However, they also
include code such that a change-cipher-spec SSL message _will_ be
allowed provided that some internal browser criteria is met. Presumably
that the signing CA is continental US based, although on a technical
level I can't see how they could have done that - I suspect that the
browsers have a list of allowable signing root CAs for step-up.

The code required to support this shouldn't really be export controlled
- all that is required is for the server to attempt to change the cipher
strength once the initial 40-56 bit connection has been established.
It's still not going to work on a server that doesn't have a cert which
is acceptable to the browser at the other end.

Given that it all seems dodgy as heck (lots of KB articles about it
breaking in various circumstances), I'd say it's better for people to
just update to a non-export browser - these certs aren't really all that
relevant any more; the backwards compatability issue is false-logic
(older browser versions contain lots of other security holes, so their
use would be bad for apps that require high security).

Cheers,

--
Ben Nagy
Network Security Specialist
Mb: TBA  PGP Key ID: 0x1A86E304 


> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED]] On Behalf Of Marc E. Mandel
> Sent: Saturday, May 25, 2002 4:25 AM
> To: [EMAIL PROTECTED]
> Subject: RE: Off-Topic - Encryption and Credit Card 
> Processing (resent)
> 
> 
> Ben:
> 
> In response to your question (see below) about surrogate/gated 
> functionality built into the major browsers since Netscape 
> and IE version 
> 3, the answer is simple.  To address the global needs of the 
> US financial 
> community, the US Government agreed to this functionality for 
> both domestic 
> and exportable versions of the browser.  The Federal 
> Government agreed to 
> this provided the server that triggers the higher strength 
> processing is 
> operating in the US or Canada and a domestic commercial certificate 
> authority (CA) with the capability of issuing such certificates is 
> utilized. To my knowledge, only VeriSign can provide such 
> certificates.  I 
> have been involved with the installation of global certificates on 
> Netscape, iPlanet, and IIS web servers since at least the 
> first quarter of 
> the Year 2000.  Initially, WebLogic servers could not handle global 
> certificates even though BEA claimed its software did.  Once 
> BEA completed 
> its legal agreement with VeriSign, the issue was supposedly 
> resolved.  While I expect that this is true, I have never 
> validated it for 
> myself.  I don't recall that an Apache web server could 
> handle the Global 
> certificates.  To function properly, the supplier of the web 
> server must 
> obtain special (export controlled) code from the issuing CA.
> 
> Note: I'm note exposing any secrets here.  You should be able 
> to obtain 
> this information freely from the VeriSign, Netscape, and 
> Microsoft public 
> web sites.  You just may have to dig for it awhile.
> 
> Sincerely yours;
> Marc Mandel
> 
> At 10:10 PM 05/24/2002 +0200, Ben Nagy wrote:
> >G'day,
> >
> >Um, could you run through that at a more technical level for me?
> >
> >How exactly does a different Verisign cert at the server end 
> make a 40 
> >bit "Colombian Special" browser suddenly able to support 128 bit 
> >encryption?
> >
> >Intrigued,
> >
> >--
> >Ben Nagy
> >Network Security Specialist
> >Mb: TBA  PGP Key ID: 0x1A86E304
[...]

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
For Account Management (unsubscribe, get/change password, etc) Please go to:
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to