> I think the question was "are you talking about certificates 
> with a validating signature?" and I think I answered that... 
> more or less. If it wasn't clear, then "YES" I am talking 
> about generated certs that will validate 100% locally.

I remember an exploit specific to IE around 2001 or so, in which IE would
accept any cert from one cert vendor as valid, even if the hostname didn't
match. I do think that was patched since then. I also remember a big problem
with intermediate certs around 2002, which affected pretty much every vendor
using SSL. I'm unaware of any current vulnerabilities like this, although
obviously that doesn't mean they don't exist.

> If by sub-bridge you mean 'the real world' where people know 
> better than to think ANYTHING is secure on a network when the 
> 'bad guy' has local access and knows what he/she is doing, 
> then yeah... that's where I live. Putting faith in SSL to 
> protect against local attacks is absurd. Claiming that 
> setting it up 'correctly' protects better against local MiTM 
> attacks is nothing short of naïve.

I'm not really sure what you mean by "local access", or "the real world" for
that matter. If by "local access" you mean access (and potential control) of
an endpoint in an SSL conversation, then yeah, you've just described the
whole problem with "clientless" SSL VPNs in a nutshell. But that's not what
anyone here (other than you, perhaps) is talking about, as far as I can
tell. And in the real world I live in, when I visit client sites, they are
often quite secure, to the point where moving a machine from one wall jack
to another requires administrative intervention (and triggers alarms if you
do it yourself).

And I'm not trying to be a dick about this, to be blunt. I don't think
you're trolling. I am not a security expert. There are a lot of things I
don't know, to say the least. But your response was essentially "Oooga
booga, you should be scared because I say so!" That's not especially
convincing. I'm familiar with using, say, Ettercap to capture HTTPS
sessions, but again, I've never seen an example where this didn't rely on
presenting an invalid certificate to the user.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized
instruction at our training centers in Washington DC, Atlanta,
Chicago, Baltimore, Northern Virginia, or on-site at your location.
Visit http://training.figleaf.com/ for more information!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Introducing the Fusion Authority Quarterly Update. 80 pages of hard-hitting,
up-to-date ColdFusion information by your peers, delivered to your door four 
times a year.
http://www.fusionauthority.com/quarterly

Archive: 
http://www.houseoffusion.com/groups/CF-Talk/message.cfm/messageid:255251
Subscription: http://www.houseoffusion.com/groups/CF-Talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4

Reply via email to