Mary and Mallory may not be the same control.

Mary has a site with a cert with AIA.  Mallory can take control over
that location for the AIA, without Mary being able to do a thing to
stop it.

-Kyle H

On Thu, Sep 18, 2008 at 2:02 PM, Eddy Nigg <[EMAIL PROTECTED]> wrote:
> On 09/18/2008 11:50 PM, Kyle Hamilton:
>
>> Client Alice connects to server Mary.  Mary sends a certificate with
>> an AIA, no chain.
>
> Cute :-)
>
>> Mary happens to be a honeypot.
>>
>> Alice looks up AIA, makes connection to Mallory to retrieve the certificate.
>>
>> Mallory is looking for people who are looking at Mary.
>>
>> Mallory knows, beyond a shadow of a doubt, that Alice is looking at Mary.
>>
>
> Since Mary and Mallory are under the same control it doesn't matter.
> Whoever controls Mary knows that Alice is looking at Mary anyway...Even
> in the scenario of Mary being compromised doesn't matter anymore...
>
> --
> Regards
>
> Signer: Eddy Nigg, StartCom Ltd.
> Jabber: [EMAIL PROTECTED]
> Blog:   https://blog.startcom.org
> _______________________________________________
> dev-tech-crypto mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to