Boris Zbarsky wrote:
Alaric Dailey wrote:
3. set up DNS and 2 severs on separate IPs with that cert

Again, you're predicating all your arguments on a stolen cert. Again, once this has happened you've lost, whether DNS is secure or not. But at this point several people have told you this repeatedly; it's pretty clear that you're going to consider implicitly using this strawman situation no matter what.

This is only one possible attack, how about setting up an MITM to the real site to skim passwords and creditcard info? Sure even if we don't steal the cert, most users don't read error boxes so you could redirect them and use a fake cert.


Point your browser to https:// 70.167.227.244 and tell me, is that the right site?

If we ignore for the moment that that IP does not resolve and pretend it did...
Try removing the space.
no, that's not the right site -- the hostname doesn't match the hostname in the cert.

do you know?   What IP should you get going to? are you sure?

The answer to that could be "any of this list of 10 IPs" for a single hostname, or "this one IP" for two totally different hostnames, of course.

Without DNS to translate the IP into something meaningful, and something the browser can match to (you know that DNS field in the cert), you have no idea you are at the right place.

Actually, even if you have the right IP you _still_ might be in the wrong place thanks to virtual hosting.
exactly! and one more place for an attack.

Browsers present SSL websites to users with an only slightly better illuminated box.... Most users have no idea there is something TO check much less how.

Yes, and further most users have no desire to learn what there is to check and how one would do it. They just want to get their stuff (banking, job, whatever) done.

Secure DNS would be great to have. Secure DNS in no way alleviates the problem of anyone being able to get a cert in someone else's name (which is pretty much where we are right now). Both problems need to be addressed.
I would assert that some CAs do the job of identity validation quite well, and that even given the problems with RegisterFly and Verisigns famous Microsoft mistake, that CAs attempt to do a good job at that.

_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to