Re: Crypto and UI issues

2005-12-18 Thread James A. Donald
-- James A. Donald Let us imagine that SSH had certified keys. Well, certifying a key is bound to be complicated, and things are bound to go wrong, and the name that you bind it to is bound to be somewhat shifty. Ben Laurie I don't see why that would happen all that much, It

browser vendors and CAs agreeing on high-assurance certificates

2005-12-18 Thread Steven M. Bellovin
http://news.com.com/Browsers+to+get+sturdier+padlocks/2100-1029_3-5989633.html?tag=st.rn The article is a bit long-winded and short on details, but the basic message is simple: too many CAs have engaged in a price- and cost-driven race to the bottom; there are thus too many certificates being

Re: crypto for the average programmer

2005-12-18 Thread Bill Stewart
At 03:34 PM 12/14/2005, [EMAIL PROTECTED] wrote: An application programmer who is using PKCS1 doesn't even need to know the small amount of ASN.1 in the spec... libraries that implement RSA PKCS1 take care of the ASN.1 for the programmer. This is in fact one reason that ASN.1 exploits have

Re: browser vendors and CAs agreeing on high-assurance certificates

2005-12-18 Thread Anne Lynn Wheeler
Steven M. Bellovin wrote: The article is a bit long-winded and short on details, but the basic message is simple: too many CAs have engaged in a price- and cost-driven race to the bottom; there are thus too many certificates being issued that aren't really trustworthy. A group of CAs and

Re: browser vendors and CAs agreeing on high-assurance certificates

2005-12-18 Thread James A. Donald
-- From: Steven M. Bellovin [EMAIL PROTECTED] http://news.com.com/Browsers+to+get+sturdier+padlocks/ 2100-1029_3-5989 633.html?tag=st.rn The article is a bit long-winded and short on details, Typical marketing bullshit. but the basic message is simple: too many CAs

Re: browser vendors and CAs agreeing on high-assurance certificates

2005-12-18 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], James A. Donald writes: -- Has anyone been attacked through a certificate that would not have been issued under stricter security? The article does not mention any such attacks, nor have I ever heard of such an attack. If no attacks, this is just an excuse

Re: browser vendors and CAs agreeing on high-assurance certificates

2005-12-18 Thread James A. Donald
-- From: Steven M. Bellovin [EMAIL PROTECTED] The very first phishing attack I ever heard of was for paypa1.com. As I recall, they did have a certificate. And would they not have had a high assurance certificate, since presumably they really were papypa1.com? Even if the

A small editorial about recent events.

2005-12-18 Thread Perry E. Metzger
A small editorial from your moderator. I rarely use this list to express a strong political opinion -- you will forgive me in this instance. This mailing list is putatively about cryptography and cryptography politics, though we do tend to stray quite a bit into security issues of all sorts, and

Re: browser vendors and CAs agreeing on high-assurance certificates

2005-12-18 Thread Adam Shostack
Higher assurance means that when the CA gets duped, it's even better for the phishers, because that nice, reassuring green bar will be there. To preserve the internet channel as a means of communicating with customers, we need to move to bookmarks, not email with clickable URLs. That method is a

Re: browser vendors and CAs agreeing on high-assurance certificates

2005-12-18 Thread David Mercer
On 12/18/05, James A. Donald [EMAIL PROTECTED] wrote: Even if the vendors do implement a policy that all new urls must be significantly different from known high value urls, which is not their stated policy, this is not going to help much with such high value urls as:

Re: browser vendors and CAs agreeing on high-assurance certificates

2005-12-18 Thread Anne Lynn Wheeler
David Mercer wrote: Holy water indeed! As at least someone on this list doesn't seem to see that there is a 'too many true names' problem, here are some examples from the ssl sites I use (almost) daily. Second level domains changed to protect the guilty (and url's chopped for safety): part

Re: A small editorial about recent events.

2005-12-18 Thread Perry E. Metzger
Perry E. Metzger [EMAIL PROTECTED] writes: A small editorial from your moderator. I rarely use this list to express a strong political opinion -- you will forgive me in this instance. A couple of people have written to ask if they can forward on this message elsewhere. Yes, I am happy with

Re: browser vendors and CAs agreeing on high-assurance certificat es

2005-12-18 Thread leichter_jerrold
| 2) the vast majority of e-commerce sites did very few number of | transactions each. this was the market segment involving e-commerce | sites that aren't widely known and/or represents first time business. it | is this market segment that is in the most need of trust establishment; | however, it

Re: browser vendors and CAs agreeing on high-assurance certificates

2005-12-18 Thread Damien Miller
James A. Donald wrote: -- Has anyone been attacked through a certificate that would not have been issued under stricter security? The article does not mention any such attacks, nor have I ever heard of such an attack. How much money does a phishing site make before it is forced to

Re: A small editorial about recent events.

2005-12-18 Thread Bill Stewart
At 10:58 AM 12/18/2005, Perry E. Metzger wrote: The President claims he has the prerogative to order such surveillance. The law unambiguously disagrees with him. There are minor exceptions in the law, but they clearly do not apply in this case. They cover only the 15 days after a declaration of

Re: browser vendors and CAs agreeing on high-assurance certificat es

2005-12-18 Thread Sidney Markowitz
On 12/19/05 9:54 AM, [EMAIL PROTECTED] wrote: Imagine a E-commerce front end: Instead of little-guy.com buying a cert which you are supposed to trust, they go to e-commerce.com and pay for a link. Everyone trusts e-commerce.com and its cert. e-commerce provides a guarantee of some sort to

Re: A small editorial about recent events.

2005-12-18 Thread Perry E. Metzger
Bill Stewart [EMAIL PROTECTED] writes: At 10:58 AM 12/18/2005, Perry E. Metzger wrote: The President claims he has the prerogative to order such surveillance. The law unambiguously disagrees with him. There are minor exceptions in the law, but they clearly do not apply in this case. They cover

Re: A small editorial about recent events.

2005-12-18 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Perry E. Metzger writes: I have been unable to find any evidence in the text of said resolutions that they in any way altered or amended the law on this, even temporarily. Perhaps it is the argument of the President's lawyers that something analogous to a state of

Re: Crypto and UI issues

2005-12-18 Thread Ben Laurie
James A. Donald wrote: -- James A. Donald Let us imagine that SSH had certified keys. Well, certifying a key is bound to be complicated, and things are bound to go wrong, and the name that you bind it to is bound to be somewhat shifty. Ben Laurie I don't see why that would happen

Re: crypto for the average programmer

2005-12-18 Thread Travis H.
Anytime someone wants to rewrite a C library in a language less prone to buffer overflows, I'm totally for it. Some say that it's not the library, it's the programmer, but I think that denies human factors. C simply requires too much machinery on top of it to use it securely. It is possible to