It seems that a group of Princeton researchers just presented a live 
theoretical* misissuance by Let's Encrypt.

They did a sub-prefix hijack via a technique other than those I described here 
and achieved issuance while passing-through traffic for other destination 
within the IP space of the hijacked scope.

They've got a paper at: 
https://petsymposium.org/2017/papers/hotpets/bgp-bogus-tls.pdf

I say that theoretical because they hijacked a /24 of their own /23 under a 
different ASN but I am given to believe that the "adversarial" ASN is also 
under their control or that they had permission to use it.  In as far as this 
is the case, this technically isn't a misissuance because hijacking ones own IP 
space is technically just a different routing configuration diverting the 
traffic to the destination they properly control to another point of 
interconnection they properly controlled.

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to