Alaric Dailey wrote:
Sure even if we don't steal the cert, most users don't read error boxes so you could redirect them and use a fake cert.

This is again an orthogonal problem. Browser handling of things like hostname/cert mismatches is abysmal. If they don't match, we should not show the site, period. In my opinion, of course.

If we ignore for the moment that that IP does not resolve and pretend it did...
Try removing the space.

I did that the first time. But yeah in current browsers, you get a long dialog that most users would completely ignore. This needs to be fixed.

Actually, even if you have the right IP you _still_ might be in the wrong place thanks to virtual hosting.
exactly! and one more place for an attack.

But again, if the cert presented doesn't match the hostname the browser requested the browser should not show the result.

I would assert that some CAs do the job of identity validation quite well, and that even given the problems with RegisterFly and Verisigns famous Microsoft mistake, that CAs attempt to do a good job at that.

Given some of the URIs posted in this thread earlier (demo sites that had certs with an O field set to Fleet and a Fleet spoof on the front page, etc), I just don't have the faith that you do in existing CAs.

And really, if you only get $20 for a cert you can't afford to do good validation. That only pays for at most 30 minutes of time for anything resembling a competent employee...

-Boris
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to