----- Original Message -----
> From: "Kurt Roeckx" <[email protected]>
> To: [email protected]
> Sent: Thursday, 31 July, 2014 9:54:45 AM
> Subject: Re: Dynamic Path Resolution in AIA CA Issuers
> 
> On 2014-07-31 01:29, Ondrej Mikle wrote:
> > I should probably add that a MitM attacker like an ISP can generally tamper
> > with
> > certificate chains sent in TLS handshake anyway, but AIA fetching would
> > allow an
> > adversary more hops away on a different continent to tamper with the
> > connection.
> 
> How would an ISP tamper with the certificates send in TLS without TLS
> giving an error that the packets were tampered with?

Because until you parse the certificates and validate the signatures you
have no way of knowing if the packets you receive are coming from the
server or the MitM box at the ISP.

-- 
Regards,
Hubert Kario
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to