Re: Return of i18n attacks with the help of wildcard certificates

2009-03-09 Thread Gervase Markham
On 03/03/09 14:30, Jean-Marc Desperrier wrote: What about a white version of the hostname display for http sites ? Because it's not reliable information due to MITM. And trying to tell users white means don't trust it, blue or green means do trust it is far harder than trust it if it's

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-04 Thread Boris Zbarsky
Florian Weimer wrote: Most users are not subject to MITM attacks This may or may not be true given the prevalence of wireless networks out there... we've had a number of reports of in-the-wild MITM attacks by wireless network operators. but they do receive all kinds of URL lures. Yes,

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-04 Thread Eddy Nigg
On 03/04/2009 03:36 PM, Boris Zbarsky: Florian Weimer wrote: Most users are not subject to MITM attacks This may or may not be true given the prevalence of wireless networks out there... we've had a number of reports of in-the-wild MITM attacks by wireless network operators. Yes, many

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-04 Thread Jean-Marc Desperrier
Eddy Nigg wrote: [...] When do we expect SSL? On submit or on password fields in a form[...] IF page contains form AND form contains password field THEN flash insecure form warning Could be done. But there would better be a cross browser agreement on this. And coupled with a way to offer

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-04 Thread Johnathan Nightingale
On 4-Mar-09, at 8:36 AM, Boris Zbarsky wrote: Florian Weimer wrote: Most users are not subject to MITM attacks This may or may not be true given the prevalence of wireless networks out there... we've had a number of reports of in-the-wild MITM attacks by wireless network operators.

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-04 Thread Eddy Nigg
On 03/04/2009 04:18 PM, Jean-Marc Desperrier: Eddy Nigg wrote: [...] When do we expect SSL? On submit or on password fields in a form[...] IF page contains form AND form contains password field THEN flash insecure form warning Could be done. But there would better be a cross browser

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-04 Thread Eddy Nigg
On 03/04/2009 04:28 PM, Johnathan Nightingale: no website can spoof the EV appearance of the site identity button and, with the ssl_domain_display pref set to non-zero, (and appropriate care given to IDN issues), they can't for regular SSL either. Right, and I'm extremely glad that we are

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-04 Thread Johnathan Nightingale
This kind of thing? https://addons.mozilla.org/en-US/firefox/addon/8128 On 4-Mar-09, at 9:42 AM, Eddy Nigg wrote: On 03/04/2009 04:28 PM, Johnathan Nightingale: no website can spoof the EV appearance of the site identity button and, with the ssl_domain_display pref set to non-zero, (and

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-04 Thread Eddy Nigg
On 03/04/2009 04:48 PM, Johnathan Nightingale: This kind of thing? https://addons.mozilla.org/en-US/firefox/addon/8128 It looks nice! I think it should also turn red if the starting page is unsecured, not only the landing page, but technically this would not be correct. However I'd fee

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-03 Thread Jean-Marc Desperrier
Gervase Markham wrote: [...] We just turned hostname display UI for SSL on, according to The Burning Edge... This is a nice change, I found out about it on the burning edge too :-) But, and as the link Eddy just reported shows, the attack is far from being only for SSL. I think we should

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-03 Thread Eddy Nigg
On 03/03/2009 04:30 PM, Jean-Marc Desperrier: But, and as the link Eddy just reported shows, the attack is far from being only for SSL. I think we should reconsider the options available to make the domain name more visible for http connexions. What about a white version of the hostname display

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-03 Thread Boris Zbarsky
Jean-Marc Desperrier wrote: But, and as the link Eddy just reported shows, the attack is far from being only for SSL. I think we should reconsider the options available to make the domain name more visible for http connexions. What about a white version of the hostname display for http sites

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-03 Thread Jean-Marc Desperrier
Boris Zbarsky wrote: Jean-Marc Desperrier wrote: But, and as the link Eddy just reported shows, the attack is far from being only for SSL. I think we should reconsider the options available to make the domain name more visible for http connexions. What about a white version of the hostname

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-03 Thread Eddy Nigg
On 03/03/2009 05:51 PM, Boris Zbarsky: Jean-Marc Desperrier wrote: But, and as the link Eddy just reported shows, the attack is far from being only for SSL. I think we should reconsider the options available to make the domain name more visible for http connexions. What about a white version

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-02 Thread Gervase Markham
On 27/02/09 14:48, Boris Zbarsky wrote: It's not clear to me that the person who added the list even knew the page existed. Neil added the list, and he wrote the second half of the page. So there was mutual knowledge. The list isn't documented on the page because, strictly speaking, it's not

Re: Return of i18n attacks with the help of wildcard certificates

2009-03-02 Thread Eddy Nigg
Subject was [Fwd: Facebook message - Received Messages Quickly] I've received it a few minutes ago. The URL doesn't us SSL, but it shows exactly what I posted in this thread not long ago...see forwarded message below: Regards Signer: Eddy Nigg, StartCom Ltd. http://www.startcom.org/

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-27 Thread Jean-Marc Desperrier
Boris Zbarsky wrote: Jean-Marc Desperrier wrote: Which blacklist ? There's a blacklist inside the browser ? Yes. See http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/modules/libpref/src/init/all.jsrev=3.762mark=704-708#704 I'm left with the feeling this really should have been more

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-27 Thread Boris Zbarsky
Jean-Marc Desperrier wrote: I'm left with the feeling this really should have been more widely documented. Could be! The existence of that protection was really hard to guess from the tld-idn-policy-list.html page : It's not clear to me that the person who added the list even knew the

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-26 Thread Jean-Marc Desperrier
Paul Hoffman wrote: At 7:09 AM +0100 2/24/09, Kaspar Brand wrote: Kyle Hamilton wrote: Removal of support for wildcards can't be done without PKIX action, if one wants to claim conformance to RFC 3280/5280. Huh? Both these RFCs completely step out of the way when it comes to wildcard

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-26 Thread Eddy Nigg
On 02/26/2009 01:49 PM, Jean-Marc Desperrier: Just one thing : The use of a wildcard certificate was a misleading red herring in the implementation of the attack. Yes, I've been saying it all along. What's truly broken is that the current i18n attack protection relies on the checking done

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-26 Thread Gervase Markham
On 26/02/09 11:49, Jean-Marc Desperrier wrote: What's truly broken is that the current i18n attack protection relies on the checking done by the registrar/IDN, and that the registrar/IDN can only check the second-level domain name component. Actually, our protection had a bug (that is, there

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-26 Thread Jean-Marc Desperrier
Gervase Markham wrote: On 26/02/09 11:49, Jean-Marc Desperrier wrote: What's truly broken is that the current i18n attack protection relies on the checking done by the registrar/IDN, and that the registrar/IDN can only check the second-level domain name component. Actually, our protection had

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-26 Thread Boris Zbarsky
Jean-Marc Desperrier wrote: Which blacklist ? There's a blacklist inside the browser ? Yes. See http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/modules/libpref/src/init/all.jsrev=3.762mark=704-708#704 The oppposite seems obviously said here :

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-23 Thread Jean-Marc Desperrier
Nelson Bolyard wrote: [...] Wildcards are not an essential part of this attack. They merely were a convenience for this demonstration, but the attack could have been done without using a wildcard cert. Even eliminating wildcard certs altogether would not stop this attack. This being said :

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-23 Thread Eddy Nigg
On 02/23/2009 02:35 PM, Jean-Marc Desperrier: - I don't expect there will be any effort to try to stop CA from issuing dangerous wildcard certificates, since it won't solve the problem at large. This isn't the cure of the problem, wild cards are very useful! The problem is the validation

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-20 Thread Jean-Marc Desperrier
Eddy Nigg wrote: On 02/19/2009 03:30 PM, Jean-Marc Desperrier: Moxie Marlinspike in Black Hat has just demonstrated a very serious i18n attack using a *.ijjk.cn certificate. http://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf .cn is

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-20 Thread Eddy Nigg
On 02/20/2009 05:55 PM, Jean-Marc Desperrier: Get a domain-validated SSL wildcard cert for *.ijjk.cn Yes, it's surprising how some of such attacks seem obvious *after* they have been done, but it takes so long to realize it can be done. Not exactly. I found it striking because we've been

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-20 Thread Nelson Bolyard
Jean-Marc Desperrier wrote, On 2009-02-20 07:55: Eddy Nigg wrote: On 02/19/2009 03:30 PM, Jean-Marc Desperrier: Moxie Marlinspike in Black Hat has just demonstrated a very serious i18n attack using a *.ijjk.cn certificate.

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-20 Thread evilredsca...@gmail.com
On Feb 20, 7:55 am, Jean-Marc Desperrier jmd...@alussinan.org wrote: Eddy Nigg wrote: On 02/19/2009 03:30 PM, Jean-Marc Desperrier: Moxie Marlinspike in Black Hat has just demonstrated a very serious i18n attack using a *.ijjk.cn certificate.

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-20 Thread Lucas Adamski
If you'd like to try out something similar, you can go to about:config and set browser.identity.ssl_domain_display to 1 (1st level domain only) or 2 (entire domain name). Lucas. On Feb 20, 2009, at 11:06 AM, evilredsca...@gmail.com wrote: On Feb 20, 7:55 am, Jean-Marc Desperrier