Re: [cryptography] yet another certificate MITM attack

2013-01-14 Thread ianG
On 15/01/13 04:53 AM, d...@geer.org wrote: Oh, I see. So basically they are breaking the implied promise of the https component of the URL. In words, if one sticks https at the front of the URL, we are instructing the browser as our agent to connect securely with the server using SSL, and to ch

Re: [cryptography] yet another certificate MITM attack

2013-01-14 Thread Jeffrey Altman
On 1/14/2013 7:39 AM, Harald Hanche-Olsen wrote: > So let me play devil's advocate for a moment: You could say that the > browser has two components: One in the phone and one in a server > somewhere. The two components communicate over a channel provided by > good old https. The phone component sen

Re: [cryptography] yet another certificate MITM attack

2013-01-14 Thread dan
> Oh, I see. So basically they are breaking the implied promise of the > https component of the URL. > > In words, if one sticks https at the front of the URL, we are > instructing the browser as our agent to connect securely with the server > using SSL, and to check the certs are in sync. >

Re: [cryptography] yet another certificate MITM attack

2013-01-14 Thread ianG
On 14/01/13 14:04 PM, Ben Laurie wrote: On 14 January 2013 06:11, ianG wrote: More particularly, banks will have a cause of action against their CA, which has not apparently batted an eye about the breach of the security model. Sure, so everyone is doing this. Sure, so there is a really good

Re: [cryptography] yet another certificate MITM attack

2013-01-14 Thread Jeffrey Walton
On Mon, Jan 14, 2013 at 7:23 AM, Harald Hanche-Olsen wrote: > [Ben Laurie (2013-01-14 11:04:11 UTC)] > >> How is any CA involved in this? > > I was wondering the same thing. But then I went back to the first post > of this series, which mentions [1] as the primary source. The actual > evidence is

Re: [cryptography] yet another certificate MITM attack

2013-01-14 Thread Harald Hanche-Olsen
So let me play devil's advocate for a moment: You could say that the browser has two components: One in the phone and one in a server somewhere. The two components communicate over a channel provided by good old https. The phone component sends the request to the server component, which in turn for

Re: [cryptography] yet another certificate MITM attack

2013-01-14 Thread Harald Hanche-Olsen
[Harald Hanche-Olsen (2013-01-14 12:23:31 UTC)] > [Ben Laurie (2013-01-14 11:04:11 UTC)] > > > How is any CA involved in this? > > I was wondering the same thing. But then [...] But then I may have responded too quickly: There is no fake certificate for google.com in there, as you might have

Re: [cryptography] yet another certificate MITM attack

2013-01-14 Thread Harald Hanche-Olsen
[Ben Laurie (2013-01-14 11:04:11 UTC)] > How is any CA involved in this? I was wondering the same thing. But then I went back to the first post of this series, which mentions [1] as the primary source. The actual evidence is seen in [2], linked to from [1]. [1] http://gaurangkp.wordpress.com/20

Re: [cryptography] yet another certificate MITM attack

2013-01-14 Thread Ben Laurie
On 14 January 2013 06:11, ianG wrote: > On 13/01/13 22:47 PM, Jeffrey Walton wrote: >> >> On Sun, Jan 13, 2013 at 1:20 PM, Warren Kumari wrote: >>> >>> >>> On Jan 12, 2013, at 4:27 AM, ianG wrote: >>> On 11/01/13 02:59 AM, Jon Callas wrote: > > -BEGIN PGP SIGNED MESSAGE- >>>

Re: [cryptography] yet another certificate MITM attack

2013-01-13 Thread ianG
On 13/01/13 22:47 PM, Jeffrey Walton wrote: On Sun, Jan 13, 2013 at 1:20 PM, Warren Kumari wrote: On Jan 12, 2013, at 4:27 AM, ianG wrote: On 11/01/13 02:59 AM, Jon Callas wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ... The Amazon FAQ for Silk did at least say: "We will establi

Re: [cryptography] yet another certificate MITM attack

2013-01-13 Thread Thierry Moreau
Jeffrey Walton wrote: On Sun, Jan 13, 2013 at 1:20 PM, Warren Kumari wrote: On Jan 12, 2013, at 4:27 AM, ianG wrote: On 11/01/13 02:59 AM, Jon Callas wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ... The Amazon FAQ for Silk did at least say: "We will establish a secure connection f

Re: [cryptography] yet another certificate MITM attack

2013-01-13 Thread Jeffrey Walton
On Sun, Jan 13, 2013 at 1:20 PM, Warren Kumari wrote: > > On Jan 12, 2013, at 4:27 AM, ianG wrote: > >> On 11/01/13 02:59 AM, Jon Callas wrote: >>> -BEGIN PGP SIGNED MESSAGE- >>> Hash: SHA1 >>> >>> ... > > The Amazon FAQ for Silk did at least say: > "We will establish a secure connection

Re: [cryptography] yet another certificate MITM attack

2013-01-13 Thread Warren Kumari
On Jan 12, 2013, at 4:27 AM, ianG wrote: > On 11/01/13 02:59 AM, Jon Callas wrote: >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA1 >> >> Others have said pretty much the same in this thread; this isn't an MITM >> attack, it's a proxy browsing service. >> >> There are a number of "optimize

Re: [cryptography] yet another certificate MITM attack

2013-01-12 Thread Jeffrey Walton
On Sat, Jan 12, 2013 at 6:11 PM, Kevin W. Wall wrote: > On Sat, Jan 12, 2013 at 4:37 PM, Jeffrey Walton wrote: >> On Sat, Jan 12, 2013 at 2:35 PM, Kevin W. Wall >> wrote: > [snip] >>> Whoa...hold on there Jeff. I'm hoping that I'm misunderstanding your >>> last statement about what the pen test

Re: [cryptography] yet another certificate MITM attack

2013-01-12 Thread Kevin W. Wall
On Sat, Jan 12, 2013 at 4:37 PM, Jeffrey Walton wrote: > On Sat, Jan 12, 2013 at 2:35 PM, Kevin W. Wall wrote: [snip] >> Whoa...hold on there Jeff. I'm hoping that I'm misunderstanding your >> last statement about what the pen testers did to "destroy a secure >> channel". >> >> Are you implying t

Re: [cryptography] yet another certificate MITM attack

2013-01-12 Thread Jeffrey Walton
On Sat, Jan 12, 2013 at 2:35 PM, Kevin W. Wall wrote: > Relevant to this thread, but OT to the charter of this list. > > On Sat, Jan 12, 2013 at 5:46 AM, Jeffrey Walton wrote: >> On Sat, Jan 12, 2013 at 4:27 AM, ianG wrote: >>> On 11/01/13 02:59 AM, Jon Callas wrote: -BEGIN PGP SIG

Re: [cryptography] yet another certificate MITM attack

2013-01-12 Thread Sandy Harris
Jon Callas wrote: > (The quibble I have is over partial security. My quibble is that lots of > partial > security systems label the partial security as being worse than no security. > I believe that partial security is always better than no security.) Except when it is marketed as just "secure"

Re: [cryptography] yet another certificate MITM attack

2013-01-12 Thread Jon Callas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Jan 12, 2013, at 1:27 AM, ianG wrote: > Oh, I see. So basically they are breaking the implied promise of the https > component of the URL. > > In words, if one sticks https at the front of the URL, we are instructing the > browser as our agent

Re: [cryptography] yet another certificate MITM attack

2013-01-12 Thread Kevin W. Wall
Relevant to this thread, but OT to the charter of this list. On Sat, Jan 12, 2013 at 5:46 AM, Jeffrey Walton wrote: > On Sat, Jan 12, 2013 at 4:27 AM, ianG wrote: >> On 11/01/13 02:59 AM, Jon Callas wrote: >>> >>> -BEGIN PGP SIGNED MESSAGE- >>> Hash: SHA1 >>> >>> Others have said pretty

Re: [cryptography] yet another certificate MITM attack

2013-01-12 Thread Jeffrey Walton
On Thu, Jan 10, 2013 at 4:53 PM, ianG wrote: > On 7/01/13 14:33 PM, ianG wrote: >> >> ... > > http://gaurangkp.wordpress.com/2013/01/09/nokia-https-mitm/ > > Pictures above seem to indicate VeriSign as the CA, but whether that means > they know about the MITMing is not clear. Might as well pin it

Re: [cryptography] yet another certificate MITM attack

2013-01-12 Thread Jeffrey Walton
On Sat, Jan 12, 2013 at 4:27 AM, ianG wrote: > On 11/01/13 02:59 AM, Jon Callas wrote: >> >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA1 >> >> Others have said pretty much the same in this thread; this isn't an MITM >> attack, it's a proxy browsing service. >> >> There are a number of "optimi

Re: [cryptography] yet another certificate MITM attack

2013-01-12 Thread ianG
On 11/01/13 02:59 AM, Jon Callas wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Others have said pretty much the same in this thread; this isn't an MITM attack, it's a proxy browsing service. There are a number of "optimized" browsers around. Opera Mini/Mobile, Amazon Silk for the Kindl

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Jeffrey Walton
On Fri, Jan 11, 2013 at 12:20 PM, Thierry Moreau wrote: > Jeffrey Walton wrote: >>> >>> > > More seriously, I agree that the questions raised by Jeffrey are relevant, > and I support his main point. End-to-end security should make some sense, > even today. Also: are they doing it over WiFi or

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread John Kemp
On Jan 11, 2013, at 3:16 PM, Thierry Moreau wrote: > John Kemp wrote: >> [...] the _spirit_ of end-to-end semantics is violated here, I believe [...] > > Personally, I am not a spiritual cryptography believer. For the purposes of HTTPS, you don't have to be; the encryption works as specified.

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Thierry Moreau
John Kemp wrote: [...] the _spirit_ of end-to-end semantics is violated here, I believe [...] Personally, I am not a spiritual cryptography believer. -- - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http://lists.randombit

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Jeffrey Walton
On Thu, Jan 10, 2013 at 6:59 PM, Jon Callas wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Others have said pretty much the same in this thread; this isn't an MITM > attack, it's a proxy browsing service. > > There are a number of "optimized" browsers around. Opera Mini/Mobile, Amaz

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Jon Callas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Jan 10, 2013, at 4:47 PM, Peter Gutmann wrote: > Jon Callas writes: > >> Others have said pretty much the same in this thread; this isn't an MITM >> attack, it's a proxy browsing service. > > Exactly. Cellular providers have been doing this f

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread ianG
On 11/01/13 21:57 PM, Jeffrey Walton wrote: On Fri, Jan 11, 2013 at 12:20 PM, Thierry Moreau wrote: Jeffrey Walton wrote: More seriously, I agree that the questions raised by Jeffrey are relevant, and I support his main point. End-to-end security should make some sense, even today. I think

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread John Kemp
On Jan 11, 2013, at 1:53 PM, Jeffrey Walton wrote: > One of the things I find most befuddling: the industry has conditioned > many folks to accept this sort of thing as "normal" > (Proxy/Interception on a "secure' channel"), even when those same > folks know better. Its seems to be a repeat of bro

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Jeffrey Walton
On Fri, Jan 11, 2013 at 12:20 PM, Thierry Moreau wrote: > Jeffrey Walton wrote: >>> >>> ... >> Perhaps they should be using the evil bit in the TCP/IP header to >> indicate someone (or entity) is tampering with the secure channel? >> https://tools.ietf.org/html/rfc3514. > > That's an April 1st RFC

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Jeffrey Walton
On Fri, Jan 11, 2013 at 1:39 PM, Adam Back wrote: > For http there is a mechanism for cache security as this is an issue that > does come up (you do not want to cache security information or responses > with security information in them, eg cookies or information related to one > user and then hav

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Adam Back
For http there is a mechanism for cache security as this is an issue that does come up (you do not want to cache security information or responses with security information in them, eg cookies or information related to one user and then have the proxy cache accidentally send that to a different us

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Thierry Moreau
Jeffrey Walton wrote: How do we teach developers to differentiate between the good "men-in-the-middle" vs the bad "man-in-the-middle"? According to another post by Peter, good ones would be based on anonymous D-H. Perhaps they should be using the evil bit in the TCP/IP header to indicate

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Jeffrey Walton
On Fri, Jan 11, 2013 at 10:04 AM, Jeffrey Walton wrote: > On Thu, Jan 10, 2013 at 7:47 PM, Peter Gutmann > wrote: >> Jon Callas writes: >> >>>Others have said pretty much the same in this thread; this isn't an MITM >>>attack, it's a proxy browsing service. >> >> Exactly. Cellular providers have

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Jeffrey Walton
On Thu, Jan 10, 2013 at 7:47 PM, Peter Gutmann wrote: > Jon Callas writes: > >>Others have said pretty much the same in this thread; this isn't an MITM >>attack, it's a proxy browsing service. > > Exactly. Cellular providers have been doing this for ages, it's hardly news. > > (Well, OK, given h

Re: [cryptography] yet another certificate MITM attack

2013-01-10 Thread Peter Gutmann
Jon Callas writes: >Others have said pretty much the same in this thread; this isn't an MITM >attack, it's a proxy browsing service. Exactly. Cellular providers have been doing this for ages, it's hardly news. (Well, OK, given how surprised people seem to be, perhaps it should be news in ord

Re: [cryptography] yet another certificate MITM attack

2013-01-10 Thread Jon Callas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Others have said pretty much the same in this thread; this isn't an MITM attack, it's a proxy browsing service. There are a number of "optimized" browsers around. Opera Mini/Mobile, Amazon Silk for the Kindle Fire, and likely others. Lots of old "WA

Re: [cryptography] yet another certificate MITM attack

2013-01-10 Thread Krassimir Tzvetanov
Good point. My thinking is: First how do you know it's Nokia that really posted this? Second read the post carefully. They are not admitting to anything. There is an implied - "if we needed to it would be secure" or something along those lines which means exactly nothing. this second thing makes

Re: [cryptography] yet another certificate MITM attack

2013-01-10 Thread Jeffrey Walton
On Thu, Jan 10, 2013 at 6:02 PM, Krassimir Tzvetanov wrote: > What the wireshark captures are showing is the OVI app talking to > their cloud (I would speculate the app is just updating its catalog or > something of that sort). > > I did not see even a mention of the word fingerprint. Let alone >

Re: [cryptography] yet another certificate MITM attack

2013-01-10 Thread Krassimir Tzvetanov
What the wireshark captures are showing is the OVI app talking to their cloud (I would speculate the app is just updating its catalog or something of that sort). I did not see even a mention of the word fingerprint. Let alone comparing the "fake" with the "real". Do I need to continue :) Krassi

Re: [cryptography] yet another certificate MITM attack

2013-01-10 Thread Jeffrey Altman
When you look at what the Nokia Browser does in the non-TLS case you see that the Nokia Browser like the Kindle Browser and Opera Mobile use a dedicated proxy server to avoid DNS latency and permit cached/compressed/reformatted web pages to be transmitted to the mobile device. This is performed by

Re: [cryptography] yet another certificate MITM attack

2013-01-10 Thread Jeffrey Walton
On Thu, Jan 10, 2013 at 4:53 PM, ianG wrote: > On 7/01/13 14:33 PM, ianG wrote: >> >> On 7/01/13 13:25 PM, Ben Laurie wrote: > > ... > Just on that theme of multiple attacks from different vectors leading to > questions at the systemic level, another certificate failure just got posted > on slashd

[cryptography] yet another certificate MITM attack

2013-01-10 Thread ianG
On 7/01/13 14:33 PM, ianG wrote: On 7/01/13 13:25 PM, Ben Laurie wrote: This is a bizarre statement in the face of Diginotar. http://wiki.cacert.org/Risk/History shows no real correlation in attacks. There are many many possible attacks, so... Just on that theme of multiple attacks from d