On 13/08/13 18:11, ianG wrote:
> Badly.  Riddled with bad, false and self-serving assumptions.  here's
> just one:
> 
>        "Before we begin, we must understand that
>        Security = Encryption * Authentication."
> 
> Wrong.  That happens to be the SSLv2 security offering, aka C.I.A. for
> confidentiality, integrity, authenticity.  That model has only the
> vaguest relationship to the security of the users.  Even the inventors
> of SSLv2 don't hold onto that position with any seriousness any more.

[Perhaps you don't mean to, but you do have a habit of writing your
points in a way which takes 3x as much effort to parse and understand as
other people's, often due to your assuming too much shared knowledge.
This provides a disincentive to engage with your argument.]

Without citations and further elaboration, there is nothing above that
can be interacted with.

> Even the browsers don't implement that model, because they famously do
> not state to the user who is authenticating what.  Substitutions without
> notice are part of the architecture.

Yep. And that's just fine. Users do not want to figure out which of 60
CAs they trust; they'd rather delegate that job to Mozilla. And we take
it seriously. If we say FooCA is OK to do authentication, then (for our
users) it's OK - and if they turn out not to be OK, we give them the boot.

This doesn't seem to me to be an argument against "Security = Encryption
* Authentication".

The point of that phrase is "Zero encryption => zero security", "zero
authentication of the endpoint => zero security".

Gerv
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to