Peter Kurrasch <[email protected]> writes:

>I think focusing on the trusted root store as a way to resolve this problem
>is (or will be) less than ideal.? I understand the desire to look there but I
>don't think it will necessarily end well.

I think focusing on the browser as a whole is less than ideal.  The browser
vendors have chosen to adopt a "security" model where anything that can refer
back to a particular string of bits in a config file is regarded as ultimately
trusted and good.  It can be loaded with malware, claim to be Bank of America
but hosted in the Ukraine, and any number of other suspicious behaviours, but
as long as there's a certificate present the browsers regard it as OK.  Given
the magic keys-to-the-kingdom approach adopted by the browser vendors, it's
not surprising that attackers are targeting those magic keys, because that's
all they need to do for the browsers to indicate that the site is fine.

So the solution isn't to look for relief from the browser vendors, because if
they were interested they'd have fixed this years ago.  Instead, we need to
rely on external agents like anti-malware apps and integrity checkers that
keep an eye on the keys to the kingdom and make sure that they're not tampered
with.  Waiting for the browser vendors to fix things is just an exercise in
frustration, while I'm pretty sure the A/V vendors added signatures for it
within hours of finding out.

Peter.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to