Gervase Markham wrote:
Ben Bucksch wrote:
OK. My thought is that we don't have many chances to push things like that and have users consider it. If we make them aware of it, it better be bulletproof, or we should not bother them with it, just treat it as little better SSL cert, no special treatment.

You're absolutely right. Educating users is an enormous effort. That's why I think whatever UI we choose (green bar, not green bar, whatever) should be decoupled from the underlying enabling technology (EV, DNSSec, phishing blacklist, whatever) we use to run it. That way, we only have to educate users once.

Right. But how many phishers have an office with a street sign saying "eBay" and a lobby?
...
Except you can't, because there won't be any information sources which confirm that your number belongs to Microsoft. Because it doesn't.
...
I don't think any information source would confirm that your address belonged to eBay.

Reliable sources like the phonebook or a random commercial database?

Do you have access to change either of those to associate your address with eBay?

Remember, of course, the phisher does not know which sources the CA is going to use. Those are (reasonably enough) kept confidential.

You are, and the CAs writing the guidelines are, not assuming that the procedures are specifically gamed, things so arranged that the malicious applicant would pass them, including renting a fake office with sign, putting up fake phone numbers and listening them for a few days or weeks, or specifically targetting the commercial database(s) that the CA uses to get your bad info in there. Esp. the latter is probably trivially easy, because the commercial databases are not security shops, just providing contact info for initiating business. Esp. so in the US, from what I've heard.

Yes, what you say about renting a fake office is possible. But think for a moment - if everyone who wanted to set up a phishing site had to do that, how much less phishing would there be?

People who rent offices leave a paper trail - they have to show their face, leave deposits and bank details, people remember them. You can't do all of this anonymously from Russia any more.

That's true. But look at spam. Most spam originates at the US, and spammers keep normal businesses, yet the US completely fails to stop the problem. One or two law suits, that's it, no impact.

But let me turn the question around: if "social engineering" means you can't trust what anyone says about anything, how do you establish anything to be true?

The government takes are of that, registering people when they are born, issueing passports and ID cards for them. And we can check the signatures against that.

That's the base of my argument, put shortly: Everything else is hearsay.

[cut]
The request is filed, and Joe intercepts the relevant mail. However, Foo CA rings BigCorp, talks to Fred Smith and finds he never signed the application, so it's rejected.

If you can intercept all mail, you can probably drag a phone call to you as well.

Something like that. Basically, you need to make sure that the person who signed the application actually exists and did sign the application. I can't quite see how you object to that check :-) It doesn't help with the problems you are particularly concerned about, but it's not meant to.

This and the weak phone number verification is in the critical path to verify the request is authorized, there's no signature (and check of it) necessary, that's the problem.

What do you mean by "bad certs"?

Cert saying I'm A Corp although I'm B Corp. CA failing on checks.

I suspect CAs will be "unofficially" looking out for the same tricks immediately. They don't want to be landed with the liability

They disclaim any liability!

Unqualified scepticism without rationale

Well, I think history has shown us that scepticism beyond all common sense is necessary when it comes to big CAs.

To be even more explicit: you definitely mean "every CA-issued certificate", rather than "every *EV* certificate"?

No, I'm talking only about EV here.

Given that nothing breaks anymore, we have no need to blink.

What do you mean by "nothing breaks"? If we are talking about *every* certificate, then for non-EV ones, all we can do if they tell us to get stuffed is to yank roots. And then lots of things break.

I mean nothing forces us to treat EV (or any SSL certs for that matter) as verified or secure. We can let the user go there, but pretend it's a normal, unsecured HTTP site. Details are UI.

As I said, exactly this is offered as service in Germany for 10 Eur, one-time fee. If they can make a site visit, they can also look at a personal ID card and check a signature. My grocery store does it! What gives?

Germany is not the rest of the world.

This was just an example that it is possible, quite so, and to give an idea about the effort / money required, to add some facts, instead of a blank "too expensive".

Surely you can see the massive differences between the grocery store situation and the cert situation? ... You are present at your grocery store

Correct, but the ID card verification service by the post office, used by movie mail-rent and a variety of other purposes, *is* comparable.

Or, if you want another example: Delivery of a delivery-confirmed letter. I'm sure that exists in the US. The postman wants your paper signature that you received the letter. He usually doesn't check the signature against any papers / ID cards, but the expensive part is the visiting. And it costs $5-10.

It's not cheap to get site visits done.

Right. It may cost them $10. Or maybe even $20! Yikes!

I don't know. I'd say the legal business name - "trading as" would be a different field.

But then you'd have certs with O fields with names no-one had ever heard of. If you go to what you think is Sony's site, and it says "Sonii Corporation" (one possible official romanisation of their Japanese name), that would make you really suspicious, wouldn't it? It should. That's exactly the sort of thing phishers do, after all - have a name that's similar but not quite the same.

I mention this merely to show that it's not an easy problem to solve.

If the real name is all useless, what do you put in the cert and display to the user? The "trading as" name? (Sorry, havn't read the spec on that.) If so, how do you verify that it doesn't overlap with another company? Company names and trademarks, potentially world-wide?

Ben
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to