SSL does not protect against the man in the middle attack because it doesn't
validate the identity of the client (which is done with client certificates,
and even then I'm not sure if it would help against the man in the middle
attack). 

SSL is not a flaw in the case.  It just doesn't prevent the man in the
middle attack, but it doesn't do anything to facilitate it.  

Back to the original question.  You should use SSL because otherwise your
traffic travels in cleartext, including username's and passwords, and can be
sniffed on the wire at any point along the route.  At hacker conventions
they often set up a wall of shame, by running a script which sniffs all
network traffic and posts the usernames and passwords on the wall for people
who use insecure protocols (SMTP, POP3, IMAP, FTP, etc).  

Even if you use some sort of encryption, it's vulnerable to the man in the
middle attack.  As mentioned before, this attack is not trivial, as it
requires either tricking the person into going to a different domain name
and then proxying the requests, or doing some sort of DNS/arp poisoning.
The DNS/arp poisoning is not easy either, unless the attacker gains access
to your dns records, or is on the local network.  If an attacker is able to
modify the hosts file on the client computer, he has everything he needs to
do a man in the middle attack.  

These attacks are not done very often in practice, however.  There are
easier ways to obtain information, such as social engineering.  

Russ

> -----Original Message-----
> From: Bobby Hartsfield [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, October 03, 2006 10:59 AM
> To: CF-Talk
> Subject: RE: Break it down for n00bs: security problems of non-SSL intrane
> t?
> 
> > Because if you're talking about self-signed certs, that's
> > been discussed previously
> 
> They weren't discussed, they were mentioned with the assumption that they
> won't validate and/or would be easily detected by a prompt to accept them
> unless they were stolen or bought... that assumption is wrong.
> 
> It has nothing to do with all the SSL VPN vendors, browser developers -
> patches, warnings, etc.
> 
> Best protection? Have a guard stand by every computer on the network and
> watch each user's every move because it's the 'only' way to keep it from
> happening.
> 
> 
> -----Original Message-----
> From: Dave Watts [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, October 03, 2006 10:35 AM
> To: CF-Talk
> Subject: RE: Break it down for n00bs: security problems of non-SSL intrane
> t?
> 
> > Again, like I said... I left details out intentionally and I
> > won't post them now just because you asked.
> 
> OK. I can understand that you don't want to release this sensitive
> information to the world. But typically, one could point to something
> which
> would describe the existence of a vulnerability without disclosing exactly
> how to exploit it. And presumably, this would be a big huge deal to all
> the
> SSL VPN vendors, browser developers - patches, warnings, etc. So, it seems
> to me that either (a) you're aware of some otherwise unknown 0day exploit,
> or (b) all the people using SSL/TLS in their products are collectively
> hoping that no one notices their fatal flaw until they can patch it.
> 
> To be clear, are you talking about certificates with a validating
> signature?
> Because if you're talking about self-signed certs, that's been discussed
> previously.
> 
> Dave Watts, CTO, Fig Leaf Software
> http://www.figleaf.com/
> 
> Fig Leaf Software provides the highest caliber vendor-authorized
> instruction at our training centers in Washington DC, Atlanta,
> Chicago, Baltimore, Northern Virginia, or on-site at your location.
> Visit http://training.figleaf.com/ for more information!
> 
> 
> 
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Introducing the Fusion Authority Quarterly Update. 80 pages of hard-hitting,
up-to-date ColdFusion information by your peers, delivered to your door four 
times a year.
http://www.fusionauthority.com/quarterly

Archive: 
http://www.houseoffusion.com/groups/CF-Talk/message.cfm/messageid:255196
Subscription: http://www.houseoffusion.com/groups/CF-Talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4

Reply via email to