Web Security Company Takes No Prisoners

2002-01-14 Thread R. A. Hettinga

http://www.nytimes.com/2002/01/14/technology/ebusiness/14SECU.html?pagewanted=print




January 14, 2002

Web Security Company Takes No Prisoners

By CHRISTINE BLANK

s a former airborne infantry officer in the Army, Clarence Briggs was
trained to protect the country from foreign enemies.

Now, he is using those specialized skills to protect his company, Advanced
Internet Technologies, from hackers, competitors and disgruntled employees.

Surrounding the company's property in Fayetteville, N.C., is coiled razor
wire atop a six-foot chain-link fence. The buildings have eight-inch- thick
concrete walls and are patrolled by uniformed guards with ready access to
firearms. Mr. Briggs explained that he did not want competitors to steal
server computers or data - something he said he had seen at other companies
that like his, serve as hosts for client's Web sites.

Mr. Briggs, who founded the privately held company six years ago along with
other former military people, has also installed video cameras, created
password access to secured areas, locked sensitive documents in a vault and
insisted on extensive employee background checks.

He said such measures were necessary to protect the 32,000 Web sites the
company operates for companies based in this country and abroad.

Security must absolutely pervade an organization, especially an I.T.
organization, Mr. Briggs said, using an abbreviation for information
technology. Most I.T. organizations don't even know how bad they get hurt
- until it's too late.

He says that the company, which is generally known as A.I.T., deals with
several attempted network hacker attacks a day.

Fortifications include A.I.T.'s custom-made firewall software, vigilant
surveillance by the staff - most of whom are military veterans with
extensive technical training.

If I catch you, no expense is too great for me to come after you, and I
will make your life miserable, Mr. Briggs, a former major, said. The
A.I.T. team tracks down perpetrators, then either phones them or sends
representatives from the company or local law enforcement agencies to warn
against further attempts.

We employ a lot of little traps to track folks that access our network,
Mr. Briggs said. We use the typical ambush techniques.

The company is so confident of its preparedness that it plans to offer a
security service for corporations this spring. The program, Mr. Briggs
said, will be modeled on A.I.T.'s mix of physical and electronic security,
along with a rapid deployment team that can be quickly dispatched to deal
with security breaches.  



-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread Eric Rescorla

Ben Laurie [EMAIL PROTECTED] writes:

 Michael Sierchio wrote:
  
  Carl Ellison wrote:
  
   If that's not good enough for you, go to https://store.palm.com/
   where you have an SSL secured page.  SSL prevents a man in the middle
   attack, right?  This means your credit card info goes to Palm
   Computing, right?  Check the certificate.
  
  To be fair,  most commercial CA's require evidence of right to use
  a FQDN in an SSL server cert.  But your point is apt.
 
 And most (all?) commercial CAs then disclaim any responsibility for
 having actually checked that right correctly...
While this is true, I'd point out that all the security software
you're using disclaims any responsibility for not having gaping
security holes.

-Ekr

-- 
[Eric Rescorla   [EMAIL PROTECTED]]
http://www.rtfm.com/



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread pasward

Eric Rescorla writes:
  Ben Laurie [EMAIL PROTECTED] writes:
  
   Michael Sierchio wrote:

Carl Ellison wrote:

 If that's not good enough for you, go to https://store.palm.com/
 where you have an SSL secured page.  SSL prevents a man in the middle
 attack, right?  This means your credit card info goes to Palm
 Computing, right?  Check the certificate.

To be fair,  most commercial CA's require evidence of right to use
a FQDN in an SSL server cert.  But your point is apt.
   
   And most (all?) commercial CAs then disclaim any responsibility for
   having actually checked that right correctly...
  While this is true, I'd point out that all the security software
  you're using disclaims any responsibility for not having gaping
  security holes.

If an automaker disclaimed liability for a vehicle, and a negligent
design or manufacture resulted in injury or loss, it is my
understanding that the liability disclaimer notwithstanding, the
automaker would be held responsible.  Why do we believe that the same
would not be the case for software?

Paul Ward



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread Eric Rescorla

[EMAIL PROTECTED] writes:

 Eric Rescorla writes:
   Ben Laurie [EMAIL PROTECTED] writes:
And most (all?) commercial CAs then disclaim any responsibility for
having actually checked that right correctly...
   While this is true, I'd point out that all the security software
   you're using disclaims any responsibility for not having gaping
   security holes.
 
 If an automaker disclaimed liability for a vehicle, and a negligent
 design or manufacture resulted in injury or loss, it is my
 understanding that the liability disclaimer notwithstanding, the
 automaker would be held responsible.  Why do we believe that the same
 would not be the case for software?
In that case, why should the liability also apply to CAs, despite their
disclaimers?

-Ekr

-- 
[Eric Rescorla   [EMAIL PROTECTED]]
http://www.rtfm.com/



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread Eric Rescorla

[EMAIL PROTECTED] writes:

 Eric Rescorla writes:
   [EMAIL PROTECTED] writes:
If an automaker disclaimed liability for a vehicle, and a negligent
design or manufacture resulted in injury or loss, it is my
understanding that the liability disclaimer notwithstanding, the
automaker would be held responsible.  Why do we believe that the same
would not be the case for software?
   In that case, why should the liability also apply to CAs, despite their
   disclaimers?
 
 Do you mean why should, or why shouldn't?  If the latter, then,
 sure, I believe it should.  People running around in business selling
 products and services and then disclaiming any liability with regard
 to their performance _for_their_intended_task_ is, IMHO, wrong.

Right. My point is this:
Security people often argue that PKI is worthless on the grounds that
the CAs disclaim all liability. This argument leads to the conclusion
that security is essentially worthless since scurity software
almost invariably comes with a disclaimer of all liability.

-Ekr

-- 
[Eric Rescorla   [EMAIL PROTECTED]]
http://www.rtfm.com/



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread Michael Sierchio

[EMAIL PROTECTED] wrote:

 If an automaker disclaimed liability for a vehicle, and a negligent
 design or manufacture resulted in injury or loss, it is my
 understanding that the liability disclaimer notwithstanding, the
 automaker would be held responsible.  Why do we believe that the same
 would not be the case for software?

Because insufficient case law exists -- some lawyers are bright
enough to see pools of liability with software, esp. known
vulnerabilities used in DDOS, etc. -- and we technologists are
not a litigious bunch.

What do you call someone who had a C average in law school?  Your honor.
That's probably the other problem.



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread Ben Laurie

Eric Rescorla wrote:
 
 Ben Laurie [EMAIL PROTECTED] writes:
 
  Michael Sierchio wrote:
  
   Carl Ellison wrote:
  
If that's not good enough for you, go to https://store.palm.com/
where you have an SSL secured page.  SSL prevents a man in the middle
attack, right?  This means your credit card info goes to Palm
Computing, right?  Check the certificate.
  
   To be fair,  most commercial CA's require evidence of right to use
   a FQDN in an SSL server cert.  But your point is apt.
 
  And most (all?) commercial CAs then disclaim any responsibility for
  having actually checked that right correctly...
 While this is true, I'd point out that all the security software
 you're using disclaims any responsibility for not having gaping
 security holes.

I have the source to all the security software I'm using... in fact, I
wrote quite a lot of it :-)

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread Stef Caunter

Does a user of ssl services care to know absolutely that they are
communicating verifiably with whom they believe they have contacted, or does
the user care to know absolutely that their communication is completely
private?
I believe that the latter is most important; transparency through
certificate presentation is kept deliberately expensive and is, as has been
noted, often disclaimed by CAs, and is compromisable. It's an artificial
system of site security perpetuated by the interests of commercial browsers.
Why can't self-verification be promoted? Why can't an nslookup call be built
into certificate presentations?
Yeah I know there's no money in it and certs are one of the few things that
actually makes money on the net, but sometimes the built-in dumbing of the
commercial internet user by their browser goes too far.
The pure truth of mathematical encryption is sold and packaged as a
certificate to the internet user, when in fact its power and utility is
free of charge, and it is only disclaimed with respect to future or unknown
developments.


Stef Caunter
[EMAIL PROTECTED]
##
$ find /self -ctime +1
##




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread John S. Denker

[EMAIL PROTECTED] wrote: 
...
 People running around in business selling
 products and services and then disclaiming any liability with regard
 to their performance _for_their_intended_task_ is, IMHO, wrong.

IMHO this presents an unsophisticated notion of 
right versus wrong.

By way of analogy:  Suppose you go skiing in Utah.
A rut left by a previous skier causes you to fall
and break your leg, or worse.  Now everybody involved
has been using the ski area _in_the_intended_manner_
yet something bad happened.  So who is liable? The 
ski area could have groomed that trail, but they 
didn't.  They could have enforced a speed limit, but
they didn't.  They could at least have bought insurance
to cover you, but they didn't.  They simply disclaimed
all liability for your injury.  Not only is this 
disclaimer a matter of contract (a condition of sale
of the lift ticket) it is codified in Utah state law.
Other states are similar.  If you don't like it, don't
ski.

Returning to PKI in particular and software defects in 
particular:  Let's not make this a Right-versus-Wrong
issue.  There are intricate and subtle issues here.
Most of these issues are negotiable.

In particular, you can presumably get somebody to insure
your whole operation, for a price.  In the grand scheme
of things, it doesn't matter very much whether you (the
PKI buyer/user) obtain the insurance directly, or whether
the other party (the PKI maker/vendor) obtains the insurance
and passes the cost on to you.  The insurer doesn't much
care; the risk is about the same either way.

The fact is that today most people choose to self-insure
for PKI defects.  If you don't like it, you have many 
options:
 -- Call up some PKI vendor(s) and negotiate for better
warranty terms.  Let us know what this does to the price.
 -- Call up http://www.napslo.org/ or some such and get
your own insurance.  Let us know the price.
 -- Write your own PKI.  Then defray costs, if desired, 
by becoming a vendor.
 -- Et cetera.

In general, there is a vast gray area between Right
and Wrong.  Most things in my life can be described
as not perfect, but way better than nothing.



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread D. A. Honig

At 10:49 AM 1/12/02 -0800, Carl Ellison wrote:

If that's not good enough for you, go to https://store.palm.com/
where you have an SSL secured page.  SSL prevents a man in the middle
attack, right?  This means your credit card info goes to Palm
Computing, right?  Check the certificate.


More demos: You can create your own cert with TinySSL, a lightweight ( 
100Kbyte) 
server for Wintel, http://www.ritlabs.com/tinyweb/tinyssl.html
and amuse your friends if they bother to read
the info there.  Using trademarks (RSA, Verisign, etc.) in the fields
would escape most.  Or, as the TinySSL docs advise, you can get a free
cert from Thawte --which *in fact* certifies only that you can receive
email at the address you gave them.

As others have written, great for enabling SSL's confidentiality, nothing
else.






-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread Stef Caunter

- Original Message -
From: Eric Rescorla [EMAIL PROTECTED]
To: Stef Caunter [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; SPKI Mailing List
[EMAIL PROTECTED]
Sent: Monday, January 14, 2002 12:44 PM
Subject: Re: CFP: PKI research workshop


 Stef Caunter [EMAIL PROTECTED] writes:
  Does a user of ssl services care to know absolutely that they are
  communicating verifiably with whom they believe they have contacted, or
does
  the user care to know absolutely that their communication is completely
  private?
 These are inextricably connected. If you want to know that
 your communications are private in the face of active attack
 you need to know who you're talking to as well.

They may be connected, but save and except in the case of active
man-in-the-middle attack I maintain that ssl's confidentiality, which is
free, is what sells certificates. I use a free Thawte email cert for
confidential communication; my identity is verified through their
notarization system, again free.


  I believe that the latter is most important; transparency through
  certificate presentation is kept deliberately expensive and is, as has
been
  noted, often disclaimed by CAs, and is compromisable. It's an artificial
  system of site security perpetuated by the interests of commercial
browsers.
 How exactly does the difficulty of getting certificates help browser
 manufacturers?

Browsers have CA root trust hard-coded into them. All commerce sites rely on
their use and code with their use in mind.  The commercial browser
manufacturers also sell certificates. It is clearly difficult to engage in
encrypted commerce without a major client browser development kit and a CA
provided cert.  The appearance of ease-of-use with a commercial certificate
and commercial browser implies _greatly_ that thing which is explicitly
_disclaimed_ by these people.


  Why can't self-verification be promoted? Why can't an nslookup call be
built
  into certificate presentations?
 What are you talking about? An nslookup call wouldn't help anything.

Why not? A self-generated certificate correlating to an ns and whois record
pointing to an active business with a human to answer inquiries seems
reasonable and no more disclaimable than CA evasiveness.

 The essential problem is establishing that the public key you receive
 over the network actually belongs to the person you think it does.
 In the absence of a prior arrangement, the only way we know how
 to do this is to have that binding vouched for by a third-party.

Yes. Trust can be earned and vouched for by other third parties. Trust
points are a commonly used method on the big auction sites. The Thawte Web
of Trust works without the blessing of a financial transaction. I'm
interested; why do we feel we have to point at something we bought to
facilitate ssl transactions? Commercial browser and commercial security
interests often promulgate the anxiety they claim to alleviate.

SC


 -Ekr

 --
 [Eric Rescorla   [EMAIL PROTECTED]]
 http://www.rtfm.com/



 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to
[EMAIL PROTECTED]





-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



From epayments news

2002-01-14 Thread R. A. Hettinga


--- begin forwarded text


Status:  U
Date: Mon, 14 Jan 2002 10:03:42 -0800
Subject: From epayments news
From: Somebody
To: R. Hettinga [EMAIL PROTECTED]

Fujitsu Transaction Solutions Inc. will unveil a new handheld computer next
week designed for retailers. The Fujitsu iPAD, a compact, Microsoft Windows
CE .NET-based mobile device, available in mid-2002, will combine a scanner,
magnetic- and smart-card reader, keypad with encryption capabilities, and
phone capability. The devices are intended to give retailers a complete,
wireless retail appliance. iPAD can be used for inventory management, debit
transactions, price verifications, phone calls, line busting, mobile POS
and gift registry. The product uses an Intel processor and can support any
802.11b wireless LAN infrastructure. With 'Windows CE .NET', iPAD will
support both XML and VoIP.

802.11b capable as well as a magstripe reader?  Perfect retail device for
skimmers don't you think?

(PS If you do forward this, zap my name OK?)

Somebody
--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



True Names reviewed on /.

2002-01-14 Thread R. A. Hettinga


--- begin forwarded text


Status:  U
From: Trei, Peter [EMAIL PROTECTED]
To: '[EMAIL PROTECTED]' [EMAIL PROTECTED]
Subject: True Names reviewed on /.
Date: Mon, 14 Jan 2002 14:08:57 -0500
Sender: [EMAIL PROTECTED]

http://slashdot.org/books/01/12/27/1845203.shtml

'michael' has reviewed True Names and The
Opening of the Cyberspace Frontier over on
slashdot. I won't discuss the review or the book
in detail other than to say that the book should
be considered Required Reading, and the review
is also good.

michael has this to say about our Resident
Author:

Timothy May, who is perhaps best
known for his ranting posts about crypto anarchy,
has a lengthy and astonishingly well-written essay
titled True Nyms and Crypto Anarchy. The
essay reads as if an editor with a firm hand
extracted most of May's characteristic wild-eyed
prose and yet kept the insightful ideas behind it - if
only all of his writing was like this essay. It's a
great introduction to what May means by crypto
anarchy. May is one of the most optimistic writers
in the book, and he, as well as the other writers,
believe that we are at a fork: either we'll move
toward a surveillance state, or toward what May
calls an anarcho-capitalist state, but the middle
ground is unstable - we'll end up at one extreme or
the other. May believes we're already firmly on
the road toward anarcho-crypto-utopia.

Peter Trei







This e-mail, its content and any files transmitted with it are intended
solely for the addressee(s) and are PRIVILEGED and
CONFIDENTIAL.  Access by any other party is unauthorized without the express
prior written permission of the sender.  If
you have received this e-mail in error you may not copy, disclose to any
third party or use the contents, attachments or
information in any way, Please delete all copies of the e-mail and the
attachment(s), if any and notify the sender.
Thank You.



--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread Eric Rescorla

Stef Caunter [EMAIL PROTECTED] writes:
 
  Stef Caunter [EMAIL PROTECTED] writes:
   Does a user of ssl services care to know absolutely that they are
   communicating verifiably with whom they believe they have contacted, or
 does
   the user care to know absolutely that their communication is completely
   private?
  These are inextricably connected. If you want to know that
  your communications are private in the face of active attack
  you need to know who you're talking to as well.
 
 They may be connected, but save and except in the case of active
 man-in-the-middle attack I maintain that ssl's confidentiality, which is
 free, is what sells certificates. 
This is confused. What sells certificates is security. Users
aren't sophisticated enough to understand the difference between
confidentiality and authentication, but they've been told by
the browser manufacturers (rightly) that in order to have security
they need to have certificates.

Saying that SSL without certificates is fine as long as you
don't have active attacks is kind of like saying that leaving
your front door open is fine as long as noone tries to break
in.

 I use a free Thawte email cert for
 confidential communication; my identity is verified through their
 notarization system, again free.
This is essentially the PGP model. It doesn't really work acceptably
for large scale e-commerce.

   I believe that the latter is most important; transparency through
   certificate presentation is kept deliberately expensive and is, as has
 been
   noted, often disclaimed by CAs, and is compromisable. It's an artificial
   system of site security perpetuated by the interests of commercial
 browsers.
  How exactly does the difficulty of getting certificates help browser
  manufacturers?
 
 Browsers have CA root trust hard-coded into them. All commerce sites rely on
 their use and code with their use in mind.  The commercial browser
 manufacturers also sell certificates.
Since when? As far as I know, Microsoft and Netscape just send you
to VeriSign.

 It is clearly difficult to engage in
 encrypted commerce without a major client browser development kit and a CA
 provided cert.
It certainly isn't true that you need a major client browser development
kit to engage in e-commerce. You can do just fine with ApacheSSL or
mod_ssl. You do generally need a certificate.
 
   Why can't self-verification be promoted? Why can't an nslookup call be
 built
   into certificate presentations?
  What are you talking about? An nslookup call wouldn't help anything.
 
 Why not? A self-generated certificate correlating to an ns and whois record
 pointing to an active business with a human to answer inquiries seems
 reasonable and no more disclaimable than CA evasiveness.
Both DNS and whois can be spoofed by an active attacker.

-Ekr

-- 
[Eric Rescorla   [EMAIL PROTECTED]]
http://www.rtfm.com/



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread Carl Ellison


At 09:44 AM 1/14/2002 -0800, Eric Rescorla wrote:
Stef Caunter [EMAIL PROTECTED] writes:
 Does a user of ssl services care to know absolutely that they are
 communicating verifiably with whom they believe they have contacted, or does
 the user care to know absolutely that their communication is completely
 private?
These are inextricably connected. If you want to know that
your communications are private in the face of active attack
you need to know who you're talking to as well.

Of course you do.  That's why https://store.palm.com/ is such a problem.  You thought 
you were talking to (and wanted to talk to) Palm Computing, just like the logos and 
page layout said you were.  You're not.  You're talking to a MITM.  Palm hired them to 
run the store?  The certificates don't say that.

[snip]

 Why can't self-verification be promoted? Why can't an nslookup call be built
 into certificate presentations?
What are you talking about? An nslookup call wouldn't help anything.
The essential problem is establishing that the public key you receive
over the network actually belongs to the person you think it does.
In the absence of a prior arrangement, the only way we know how
to do this is to have that binding vouched for by a third-party.


Actually, Eric, the third party might confuse that for you.  The function it performs 
with respect to naming is not totally unlike the function of early anonymizers.  The 
TTP chooses a name to bind to the public key that might have only a tenuous relation 
to the name by which you know the keyholder.  As a result, when you do a name 
comparison between the certificate Subject and what you know about this person, the 
person you think it does, you may have to make a guess about whether the match is 
correct.

Here we spend all this effort to reduce the probability of error, in the cryptography, 
to values like 2^{-128} and then make the security decision depend just as much on a 
guess with a much greater probability of error.  From the point of view of error 
probability, we should have left out the cryptographic part entirely.

 - Carl

P.S. the workshop where we should (and probably will) be discussing this is 
http://www.cs.dartmouth.edu/~pki02/ and there are still two weeks before papers are 
due.



++
|Carl Ellison  Intel E: [EMAIL PROTECTED] |
|2111 NE 25th Ave  M/S JF3-212   T: +1-503-264-2900  |
|Hillsboro OR 97124  F: +1-503-264-6225  |
|PGP Key ID: 0xFE5AF240  C: +1-503-819-6618  |
|  1FDB 2770 08D7 8540 E157  AAB4 CC6A 0466 FE5A F240|
++




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread Eric Rescorla

Carl Ellison [EMAIL PROTECTED] writes:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 At 09:44 AM 1/14/2002 -0800, Eric Rescorla wrote:
 Stef Caunter [EMAIL PROTECTED] writes:
  Does a user of ssl services care to know absolutely that they are
  communicating verifiably with whom they believe they have contacted, or does
  the user care to know absolutely that their communication is completely
  private?
 These are inextricably connected. If you want to know that
 your communications are private in the face of active attack
 you need to know who you're talking to as well.
 
 Of course you do.  That's why https://store.palm.com/ is such a
 problem.  You thought you were talking to (and wanted to talk to)
 Palm Computing, just like the logos and page layout said you were.
 You're not.  You're talking to a MITM.  Palm hired them to run the
 store?  The certificates don't say that.
The certificates say EXACTLY that. They say that this entity 
is authorized to use the domain name store.palm.com. 

-Ekr

-- 
[Eric Rescorla   [EMAIL PROTECTED]]
http://www.rtfm.com/



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread Carl Ellison


At 02:47 PM 1/14/2002 -0800, Eric Rescorla wrote:
  Meanwhile, the information that the user
 really looks at to make a security decision (the Palm logo and the
 little padlock) aren't related at all.
No possible security system can protect people who trust
whatever logo happens to be transmitted to them in web pages.



That is certainly true today, but that is precisely how users decide whether or not to 
give up their credit card numbers or more sensitive information.  It's a good thing 
that the user is absolved of liability in case the credit card is stolen.  I disagree 
that it's not possible to secure logos.  It's a MMOP (mere matter of programming). :)

 - Carl



++
|Carl Ellison  Intel E: [EMAIL PROTECTED] |
|2111 NE 25th Ave  M/S JF3-212   T: +1-503-264-2900  |
|Hillsboro OR 97124  F: +1-503-264-6225  |
|PGP Key ID: 0xFE5AF240  C: +1-503-819-6618  |
|  1FDB 2770 08D7 8540 E157  AAB4 CC6A 0466 FE5A F240|
++




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: CFP: PKI research workshop

2002-01-14 Thread Eric Rescorla

Carl Ellison [EMAIL PROTECTED] writes:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 At 02:47 PM 1/14/2002 -0800, Eric Rescorla wrote:
   Meanwhile, the information that the user
  really looks at to make a security decision (the Palm logo and the
  little padlock) aren't related at all.
 No possible security system can protect people who trust
 whatever logo happens to be transmitted to them in web pages.

 That is certainly true today, but that is precisely how users decide
 whether or not to give up their credit card numbers or more
 sensitive information.  It's a good thing that the user is absolved
 of liability in case the credit card is stolen.  I disagree that
 it's not possible to secure logos.  It's a MMOP (mere matter of
 programming). :)
I didn't say that it wasn't possible to secure logos. I said that
you couldn't protect people who trusted logos that were transmitted
to them in Web pages. This is not the same thing. The point is
that such logos are transmitted in-band and are part of the web
page. Therefore, they are not cryptographically verified.

-Ekr


-- 
[Eric Rescorla   [EMAIL PROTECTED]]
http://www.rtfm.com/



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



PGP GPG compatibility

2002-01-14 Thread Nicholas Brawn

What's the state of the game with PGP and GPG compatibility?

Nick

--
Real friends help you move bodies.




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]