> Perhaps wandering a bit off-topic, but in practice many CAs which are
> trusted by most browsers will issue certificates to whomever controls
> a domain at the time the cert is issued, and so there's very little
> difference between trusting DNS and trusting DNS+SSL for site
> authentication (though of course SSL has the advantage of encrypting
> the connection).

> In other words, the difference between the model Soner expected and
> reality is the purchase of a certificate for a few tens of dollars
> from one of the many CAs that do minimal checking before issuing
> certificates.

You are in a place where theory and practice converge. The security model
assumes you don't trust a CA (in the technical sense) if you don't trust the
CA (in the normal sense). It is built around the assumption that a client's
list of trusted CAs will be intelligentally managed to include only those
whose certificate issuing policies are acceptable to the ise the client
software will be put.

The reality is that the human being using the software may not even have any
idea that his software contains a list of trusted CAs. The odds that he
knows any given CA's security policy is even lower.

In the case of a credit card number, the security as actually implemented,
is probably adequate. For online banking, IMO, it probably is not adequate.
The success of phising schemes largely proves this.

It is a somewhat unfortunate reality that we've gotten ourselves into.

I wish I had some brilliant idea for a solution. EV certificates are at
least a tiny bit of a solution. User education is, unfortunately, going to
have to be part of any forseeable solution.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to