Re: phishing web sites using self-signed certs

2005-11-17 Thread cdr

Peter Gutmann wrote:

cdr <[EMAIL PROTECTED]> writes:

If this was to be done, it would quickly become the best known
example of simple-minded, ill suited for real world "I-know-best"
attitude on the part of programmer. We know users have choice,
and the net result, I predict, would be their migration to other
browsers.
 
So the ideal browser for users would be one that ignores security issues

entirely and just connects without any notification to save them having to
bother to click "OK" on the "Connect anyway" dialog?

Peter.


No, I readily agree it wouldn't.

As I suggested elsewhere in this thread, I believe the ideal browser would
support two complementary protocols, one based on TTP, the other on KCM,
with the user being aware which one is s/he operating under.

cdr

p.s.: isn't this what your above-mentioned [RFC_duckling.txt] points
towards? (Now that you referenced it in a public mail-list, I fully
intend to use it as the evidence that even P.G. thinks this is how
the browsers should operate. :)
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-17 Thread Peter Gutmann
Wan-Teh Chang <[EMAIL PROTECTED]> writes:

>Here is a recent paper related to Key Continuity:
>http://www.simson.net/ref/2005/johnny2_usenixsecurity05_submited.pdf

There's also my I-really-should-finish-this BCP draft, available at
http://www.cs.auckland.ac.nz/~pgut001/pubs/RFC_duckling.txt.  Comments on that
are welcome... maybe then I'll get around to finishing it :-).

Peter.

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-17 Thread Peter Gutmann
cdr <[EMAIL PROTECTED]> writes:

>Peter Gutmann wrote:
>> Treat it as an unrecoverable error...
>> ...in the same format as [...] a "Server not found"-type message.  

>If only it was so simple...

>If this was to be done, it would quickly become the best known
>example of simple-minded, ill suited for real world "I-know-best"
>attitude on the part of programmer. We know users have choice,
>and the net result, I predict, would be their migration to other
>browsers.

So the ideal browser for users would be one that ignores security issues
entirely and just connects without any notification to save them having to
bother to click "OK" on the "Connect anyway" dialog?

Peter.

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-07 Thread Anne & Lynn Wheeler
Anne & Lynn Wheeler <[EMAIL PROTECTED]> writes:
> some number of the PKI afficionados were claiming that credit card
> transactions could be modernized by upgrading the transactions with
> PKI (adding a digital certificate to every credit card transaction).

the other thing going on in this period ... in addition to the
flailing around attempting to do something about all our harping about
payment card industry had proven something like 30 yrs earlier that
CRLs didn't scale (although most of the effort seemed misdirected in
attempting to still preserve the PKI offline credential paradigm w/o
having to really move into real modern online transactions)   was
the EU data privacy directive standard (EU-DPD).

i was one of the co-authors of the more recent x9 financial industry
privacy standard and took into account some amount of the EU-DPD.
some minor reference can be seen here with respect to the privacy
merged taxonomy and glossary (in support of the x9.99 work)
http://www.garlic.com/~lynn/index.html#glosnote

in any case, there were various statements that electronic retail
payments needed to be anonomous as cash. one practical implication was
that names would have to come off the payment cards and identification
procedures be eliminated from point-of-sale operation (hopefully
substituting stronger forms of authentication). applying that to
e-commerce implied that you had to avoid getting bollixed up with x.509
identity certificates and continually digging yourself into the hole
of confusing authentication and identification. this frequent
confusing of authentication and identification was constantly
compromising the ability to achieve any reasonable privacy objectives.

a few past posts on eu-dpd and retail payments w/o identification
http://www.garlic.com/~lynn/aadsm12.htm#27 Employee Certificates - Security 
Issues
http://www.garlic.com/~lynn/aadsm17.htm#21 Identity (was PKI International 
Consortium)
http://www.garlic.com/~lynn/2000g.html#33 does CA need the proof of acceptance 
of key binding ?

-- 
Anne & Lynn Wheeler | http://www.garlic.com/~lynn/
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-07 Thread Anne & Lynn Wheeler

there are periodic comments that OCSP fixes the offline
characteristics of digital certificate credentials.

some recent postings related to the subject:
http://www.garlic.com/~lynn/2005i.html#0 More Phishing scams, still no SSL 
being used
http://www.garlic.com/~lynn/2005l.html#1 The Worth of Verisign's Brand
http://www.garlic.com/~lynn/2005l.html#31 More Phishing scams, still no SSL 
being used
http://www.garlic.com/~lynn/2005l.html#32 More Phishing scams, still no SSL 
being used

basically around the time we were involved with this small
client/server startup that wanted to do payments and had this
technology called SSL ... 
http://www.garlic.com/~lynn/subpubkey.html#sslcert

some number of the PKI afficionados were claiming that credit card
transactions could be modernized by upgrading the transactions with
PKI (adding a digital certificate to every credit card transaction).

our somewhat off-hand response was that would involved setting the
credit card transactions back 20-30 years. in the 60s, credit card
transactions had offline credentials and revokation lists ... monthly
booklets that were sent out to every merchant once a month. as credit
cards became more widely adapted ... the booklets got larger (since
the number of cards in play was dramatically increasing), the number
sent out dramatically increased (since the number of merchants were
increasing), and they were being sent out more frequently (since the
absolute number of invalid cards was reaching a risk threshold faster
... even if the percentage remained constant). the approach was on its
way to having to distribute tens of millions of booklets with hundreds
of thousands of entries, every couple hrs.

the introduction of online, electronic in the 70s allowed that
untenable paradigm to be eliminated. in theory, the online, electronic
approach could have taken the OCSP approach, preserving the offline
credential paradigm and simply upgrading the revokation business
process with a indication of whether the offline credential was still
valid or not. however, they actually transitioned to a real online,
electronic paradigm ... but changing the paradigm from offline
credential to an online transaction that actually told the merchant
whether they would get paid or not.

so everytime somebody would make the claim that PKI would make credit
card transactions more modern, we would started the refrain that PKI
would represent a 20-30 year regression in the business process. when
OCSP was introduced (could somewhat be considered as the result of our
heckling the revokation list process), we also heckled OCSP as going
to all the trouble of doing an online transactions ... but didn't
actually leverage the possible business process benefits of doing
online transactions ... but continued to preserve the offline
credential paradigm of PKI.

part of the issue was confusing the digital signature technology with
the PKI business process. While digital signature technology for
transaction authentication would represent a modernization effort,
reverting to an offline credential paradigm represented by the offline
PKI model would be a 20-30 year regression in the business model and
doing real online transactions.

This was also during the period that you found PKI aficionados making
statements about modernization driver's licenses with the PKI model.
However, in this period ... most infrastructure operations that made
serious reference to a driver's license was also migrating to real
online transactions; aka going to all the trouble of having a real
online transaction wasn't going to be crippled by following the OCSP
model and just checking to see simply whether the credential was still
valid or not ... if you are going to the trouble of doing a real
online transaction ... lets make it worth the trouble and respond with
all facts that might be of interest related to the official doing
their business. While driver's licenses can still work as an offline
credential ... they are more & more being used as part of a real
online transactions ... as opposed to trivially checking as to whether
the offline credential is still valid or not.

the other story from the period of possibly some interest with regard
to modernizing online, real-time credit card by appending stale,
static digital certificates ... was that even relying-party-only
digital certificates from the period
http://www.garlic.com/~lynn/subpubkey.html#rpo

could represent a 4k-12k byte payload burden.

the nominal iso8583 payment transaction is on the order of 60-80
bytes. the appending of a redudant and superfluous, stale, static
digital certificate to a payment transaction represents an enormous
payload bloat on the order of two orders of magnitude ... serving no
useful purpose.

now in the x9 financial standards body, the x9a10 working group was
given the task of preserving the integrity of the financial
infrastructure for all retail payments. the result was x9.59 standard
http://www.garlic.com/~lynn/i

Re: phishing web sites using self-signed certs

2005-11-05 Thread Nelson B
Arshad Noor wrote:

> It is my belief that what is needed is a new trust model, where
> only the digital certificates of CA's of a federal entity of a
> nation [snip]

> The Federal CA in turn, will issue the CA certificates of the
> states that are part of that federal entity (the 50 US states,
> for example), who in turn will issue the CA certificate for the
> office of the Secretary of State in each state.  For smaller
> nations, the Federal CA might issue the certificate to the
> agency that incorporates/licenses business entities, directly.

That's not a new trust model at all.  It's the original model of X.500
and X.509.  In that model, there is one global hierarchy of Directory
Servers, with each country having one Directory, with subordinate
directories (servers) for states, which in turn have subordinate
directories for localities, etc.  For each of these directories, there
would be one cert issuer who was authorized to issue certs for that
directory's scope, and hence was the certificate authority for that
subspace of the directory name space.  Certificate authorities and
their subordinate registration authorities would also be organized as
a hierarchy which more-or-less matched the directory hierarchy.
Certificates would be accessible from the related directory servers.
That's why cert subject and issuer names are directory names.

The scheme is a single global hierarchy.  For each region served, there
is one authoritative service, which is a monopoly for that region.  The
standards body that produced X.50x was the body that sets the international
telephony standards, and they imagined that this service would be run by
each country's postal or telephone service agency.

Given the ubiquity of postal and telephony services, I think that
hierarchical model might have worked well, better than the existing
alternative ad-hoc set of authorities has worked.  In its absence, we
are beset with a mostly non-authoritative set of cert issuers; a few
cert issuers that make a sincere effort to verify what they certify,
an increasing number of issuers whose certification doesn't mean much,
and with a plethora of self-issued certs.

-- 
Nelson B
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-03 Thread Julien Pierre

Ka-Ping Yee wrote:

On Thu, 3 Nov 2005, Julien Pierre wrote:


Ka-Ping Yee wrote:


On Wed, 2 Nov 2005, Julien Pierre wrote:



The account (or other relationship) you previously established at the
website you wanted -- the "one truly intended" as you put it.  The
phisher wants to fool you into believing you are participating in that
relationship when in reality you are dealing with an impostor.  By
keeping note of the certificate information, your browser can tell you
reliably whether you are dealing with the same site and not an impostor.


No. A party is allowed to use more than one certificate, for reasons
such as renewal, or many other. There is nothing in X.509 or SSL that
says one party only has one cert, quite the contrary.  The fact that
the certificate has changed since your last communication does not
tell you that you aren't dealing still with the same site .



But that is not under control of the phisher.  Only the legitimate
party can produce the correct certificate, and that is what matters.
When you are phished, someone is trying to make you believe that you
are at the SAME site when in reality you are at a DIFFERENT site.
The situation you're describing is not phishing; it's backwards (you
think you are at a different site when you are at the same site),
and it can only occur with consent of the legitimate site.


The point I was trying to make is that there is not one unique correct 
certificate. The fact that the certificate changed or didn't change 
tells you nothing about its validity.


In fact the certificate could be the same both times, but it could have 
been revoked by the CA between the two communications, eg. for reason of 
key compromise, and you could in fact be dealing with a phisher the 
second time .


The fact is that the information about which certificate was used in a 
previous communication is not relevant to the problem of authenticating 
the site the 2nd time around. To provide security, the certificate needs 
to be fully verified and validated again.

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-03 Thread Ka-Ping Yee
On Thu, 3 Nov 2005, Julien Pierre wrote:
> Ka-Ping Yee wrote:
> > On Wed, 2 Nov 2005, Julien Pierre wrote:
>
> > The account (or other relationship) you previously established at the
> > website you wanted -- the "one truly intended" as you put it.  The
> > phisher wants to fool you into believing you are participating in that
> > relationship when in reality you are dealing with an impostor.  By
> > keeping note of the certificate information, your browser can tell you
> > reliably whether you are dealing with the same site and not an impostor.
>
> No. A party is allowed to use more than one certificate, for reasons
> such as renewal, or many other. There is nothing in X.509 or SSL that
> says one party only has one cert, quite the contrary.  The fact that
> the certificate has changed since your last communication does not
> tell you that you aren't dealing still with the same site .

But that is not under control of the phisher.  Only the legitimate
party can produce the correct certificate, and that is what matters.

When you are phished, someone is trying to make you believe that you
are at the SAME site when in reality you are at a DIFFERENT site.
The situation you're describing is not phishing; it's backwards (you
think you are at a different site when you are at the same site),
and it can only occur with consent of the legitimate site.


-- ?!ng
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-03 Thread Wan-Teh Chang

Julien Pierre wrote:

Ka-Ping Yee wrote:

On Wed, 2 Nov 2005, Julien Pierre wrote:



The account (or other relationship) you previously established at the
website you wanted -- the "one truly intended" as you put it.  The
phisher wants to fool you into believing you are participating in that
relationship when in reality you are dealing with an impostor.  By
keeping note of the certificate information, your browser can tell you
reliably whether you are dealing with the same site and not an impostor.


No. A party is allowed to use more than one certificate, for reasons 
such as renewal, or many other. There is nothing in
X.509 or SSL that says one party only has one cert, quite the contrary. 
 The fact that the certificate has changed since your last communication 
does not tell you that you aren't dealing still with the same site .


Authentication by Key Continuity is not textbook PKI.
It is based on the observation that it is very hard
for an impostor to deceive you multiple times, so the
more successful interactions you have had with the *same*
entity, the more trust you have in it.  (I don't remember
how Key Continuity deals with an eavesdropping man in
the middle.)  With Key Continuity, you don't need to
get the trust from a CA; the certificates can be self
signed.  You build up the trust in a certificate as
you have more and more successful interactions with
that *same* entity.

Here is a recent paper related to Key Continuity:
http://www.simson.net/ref/2005/johnny2_usenixsecurity05_submited.pdf

Wan-Teh

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-03 Thread lynn
Arshad Noor wrote:
> While third-party verification is not the real issue, the issue
> is: can the third-party itself be trusted?  Who remembers the
> Verisign debacle from a few years ago with the Class-3 digital
> certificates issued through a social engineering attack, in the
> name of Microsoft?
>
> http://news.com.com/2100-1001-254586.html?legacy=cnet
> http://www.eweek.com/article2/0,1895,1243314,00.asp

there is actually several separate issues, some of which are

* who is doing certification
* what process are they using for certification
* are they willing to accept liability associated with their
certification
* how is the certification represented

using a taxonomy that clearly delineates the difference between
certification of information from using digital certificates for
representing that certification process ... somewhat shows up some of
the fallicy of self-signed digital certificates  part of this is
sometimes people seem to be confusing the existance of a digital
certificate as having some magical certification quality all by itself
... rather than as a representation of some certification process.

PKIs and digital certificates are a business process to address the
letters of credit paradigm from the sailing ship days for offline
certification representation ... i.e. the relying party has no
mechanism for doing real-time and/or online checking the validity of
the information. furthremore, current generation of certification
authorities have tended to be independent 3rd parties who are checking
with various authoritative agencies as to the validitity of some
information and then issuing certificates that represent that such a
checking process has been done. they typically haven't been the
authoritative agency actually responsible for the verified information.


as the online world with the internet becoming more pervasive ... some
of the authoritative agencies actually responsible for various kinds of
information being verified have looked at providing online, real-time
verification services associated with the information in question
(as opposed to the stale, static certificate model that was designed to
meet the needs of relying parties that had no direct way of actually
contacting the authoritative agency for directly verifying the
information).

to some extent, as the online, internet world has become more pervasive
... the target offline market for digital certificates has shrunk and
there has been some migration to the no-value market segment. rather
than the relying party being unable to directly contact the
authoritative agency responsible for the information, the no-value
market has the relying party doing operations where there is
insufficient value justification for directly contacting the
authoritative agency (aka no-value operations). even this market
segment is shrinking as the internet is not only providing pervasive
world-wide online connectivity but also drastically reducing the cost
of that online connectivity world-wide.

a couple related posts on the subject:
http://www.garlic.com/~lynn/2005s.html#43 P2P Authentication
http://www.garlic.com/~lynn/aadsm21.htm#20 Some thoughts on
high-assurance certificates
http://www.garlic.com/~lynn/aadsm21.htm#21 Some thoughts on
high-assurance certificates

misc. collected past posts on ssl domain name server certificates
http://www.garlic.com/~lynn/subpubkey.html#sslcert

misc. collected past posts on certification enviornments that can be
done w/o requiring digital certificates for representing that
certification
http://www.garlic.com/~lynn/subpubkey.html#certless

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-03 Thread Julien Pierre

Ka-Ping Yee wrote:

On Wed, 2 Nov 2005, Julien Pierre wrote:



The account (or other relationship) you previously established at the
website you wanted -- the "one truly intended" as you put it.  The
phisher wants to fool you into believing you are participating in that
relationship when in reality you are dealing with an impostor.  By
keeping note of the certificate information, your browser can tell you
reliably whether you are dealing with the same site and not an impostor.


No. A party is allowed to use more than one certificate, for reasons 
such as renewal, or many other. There is nothing in
X.509 or SSL that says one party only has one cert, quite the contrary. 
 The fact that the certificate has changed since your last 
communication does not tell you that you aren't dealing still with the 
same site .


If you used that logic, and you were fooled the first time into 
accepting the cert, you will be fooled again the second time and be 
talking with the same impostor.



Assuming your IM protocol is encrypted, somehow when your IM client
talks to an IM server, or to an IM peer, it needs to verify the identity
of that server or peer before logging in. Encryption buys you nothing if
your client encrypts to the wrong party.



Your buddy list should record the key that was used last time and identify
the other party by the fact that it is using the same key this time.


That assumes you weren't fooled the first time, and the peer always uses 
the same key. Some protocols might have the later attribute, but you 
would still need to solve the first problem of the initial verification.

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-02 Thread Ka-Ping Yee
On Wed, 2 Nov 2005, Julien Pierre wrote:
> Ka-Ping Yee wrote:
> >>What other way does the average non-technical user have to know that the
> >>secure website is the one truly intended and not a fake, except than to
> >>rely upon a third party to do the verification for them ? Self-signed
> >>certs certainly don't provide any of that type of assurance.
> >
> > What matters is that the certificate represents the *same* organization
> > you created the account with, not that the certificate was purchased
> > from a particular company.
>
> What account or you talking about ?

The account (or other relationship) you previously established at the
website you wanted -- the "one truly intended" as you put it.  The
phisher wants to fool you into believing you are participating in that
relationship when in reality you are dealing with an impostor.  By
keeping note of the certificate information, your browser can tell you
reliably whether you are dealing with the same site and not an impostor.

> Assuming your IM protocol is encrypted, somehow when your IM client
> talks to an IM server, or to an IM peer, it needs to verify the identity
> of that server or peer before logging in. Encryption buys you nothing if
> your client encrypts to the wrong party.

Your buddy list should record the key that was used last time and identify
the other party by the fact that it is using the same key this time.


-- ?!ng
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-02 Thread Ka-Ping Yee
On Thu, 3 Nov 2005, Duane wrote:
> Ka-Ping Yee wrote:
> > Using a petname field to label a website is really no different than
> > assigning names to your IM buddies, which people already do.  Why doesn't
> > impersonation work on IM? [*]  Because your buddy list keeps track of who
> > you know.  It can be the same way, and just as easy, with Web browsers.
>
> The difference being that you form a close relationship with IM buddies,
> the same can't be said for a shop you go online to purchase from you
> found on pricewatch.com...

Let's make sure we're talking about the same problem here.  When we're
talking about phishing, i assume this means a scam where someone tries
to impersonate a website you already have a relationship with -- for
example, they're trying to get your online banking password.  A petname
(or buddy-list-like) mechanism can protect you from that type of attack.

Were you thinking of a different attack?


-- ?!ng
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-02 Thread Julien Pierre

Ka-Ping,

Ka-Ping Yee wrote:

What other way does the average non-technical user have to know that the
secure website is the one truly intended and not a fake, except than to
rely upon a third party to do the verification for them ? Self-signed
certs certainly don't provide any of that type of assurance.


What matters is that the certificate represents the *same* organization
you created the account with, not that the certificate was purchased
from a particular company.  


What account or you talking about ?


Using a petname field to label a website is really no different than
assigning names to your IM buddies, which people already do.  Why doesn't
impersonation work on IM? [*]  Because your buddy list keeps track of who
you know.  It can be the same way, and just as easy, with Web browsers.


-- ?!ng

[*] If your IM protocol is not encrypted, you are vulnerable.  Compare
apples to apples, though: the analogy is between encrypted IM and
browsing the Web with SSL.


Assuming your IM protocol is encrypted, somehow when your IM client 
talks to an IM server, or to an IM peer, it needs to verify the identity 
of that server or peer before logging in. Encryption buys you nothing if 
your client encrypts to the wrong party.

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-02 Thread Duane

Ka-Ping Yee wrote:


Using a petname field to label a website is really no different than
assigning names to your IM buddies, which people already do.  Why doesn't
impersonation work on IM? [*]  Because your buddy list keeps track of who
you know.  It can be the same way, and just as easy, with Web browsers.


The difference being that you form a close relationship with IM buddies, 
the same can't be said for a shop you go online to purchase from you 
found on pricewatch.com...


--

Best regards,
 Duane

http://www.cacert.org - Free Security Certificates
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
http://happysnapper.com.au - Sell your photos over the net!
http://e164.org - Using Enum.164 to interconnect asterisk servers

"In the long run the pessimist may be proved right,
but the optimist has a better time on the trip."
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-02 Thread Ka-Ping Yee
On Tue, 1 Nov 2005, Julien Pierre wrote:
> Ka-Ping Yee wrote:
> > What fraction of the 30 to 50 root CAs on your root CA list do you
> > know or have ever heard of?  Do you know their policies?  Do you know
> > their management?  Why should you trust them?
> >
> > What makes a website legitimate is the fact that it is the website
> > you truly intended, not the fact that it happens to have paid a member
> > of the CA extortion ring.
>
> What other way does the average non-technical user have to know that the
> secure website is the one truly intended and not a fake, except than to
> rely upon a third party to do the verification for them ? Self-signed
> certs certainly don't provide any of that type of assurance.

What matters is that the certificate represents the *same* organization
you created the account with, not that the certificate was purchased
from a particular company.  Browsers should help users keep track of
these identities, using mechanisms such as the petname toolbar, instead
of showing more warning dialogs or making warnings more severe.

Using a petname field to label a website is really no different than
assigning names to your IM buddies, which people already do.  Why doesn't
impersonation work on IM? [*]  Because your buddy list keeps track of who
you know.  It can be the same way, and just as easy, with Web browsers.


-- ?!ng

[*] If your IM protocol is not encrypted, you are vulnerable.  Compare
apples to apples, though: the analogy is between encrypted IM and
browsing the Web with SSL.
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-02 Thread Duane

Arshad Noor wrote:


The ICANN analogy is not appropriate in this context, because


You missed the point I was making, the internet is global, not 
geographically localised in the case of issuing business names, this is 
compounded by the fact that .com/net/org is literally a free for all 
rather then forcing people to register under country code TLDs.


This may be ok *IF* and it's a big if the browsers honoured some of the 
RFCs with respect to scope of allocations, but this isn't the case at 
present.


So if all countries fronted up with a root certificate or one for each 
state which is the case in both the US and Australia, and then started 
issuing certificates for "*" suddenly the any government can be snooping 
all your encrypted traffic because they browsers never track certificate 
fingerprints.


Further more do you trust EVERY SINGLE government out there to take 
proper safe guards of their private keys?


What happens if a corrupt government sells a private key to scammers and 
they start issuing certificates for scam sites?


Nice idea in theory, but then again everything works in theory...

--

Best regards,
 Duane

http://www.cacert.org - Free Security Certificates
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
http://happysnapper.com.au - Sell your photos over the net!
http://e164.org - Using Enum.164 to interconnect asterisk servers

"In the long run the pessimist may be proved right,
but the optimist has a better time on the trip."
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-02 Thread Hendrik Weimer
Ka-Ping Yee <[EMAIL PROTECTED]> writes:

> Refusing to accept self-signed certificates is *not* the right thing
> to do.  That would only further the notion that buying a certificate
> from one of dozens of approved CAs is what makes a website legitimate,
> which is false.

Not necessairly. It will shift the focus from certificate warnings to
the installation of additional root CAs. The problems will remain the
same, however the users will suffer as some websites won't be
accessible for them.

Hendrik
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-01 Thread Arshad Noor

No, I'm afraid you got that wrong.  Any site is free to do
what they want. Consumers are also free to do what they want.

However, the outlined scheme provides for a uniform way for
a consumer to trust a company's digital certificate, based on
the laws of the jurisdiction that established that company in
the real world.  As a consumer, I still get to choose whether
I trust that company or not - but the legitimacy of the
company or its digital certificate is not in question.

There is a corollary benefit to the outlined scheme: today,
as long as your credit card is good, you can get a server SSL
certificate from most CA's in the browser, regardless of who
you are.  Thus, the existing scheme, benefits attackers.  The
outlined scheme has an underlying paper-trail by default,
potentially leading to officers of the business entity who
can be held responsible for illegal activities.

Arshad Noor
StrongAuth, Inc.

cdr wrote:


Did I get that right...? Do you seriously propose that only
government-sanctioned sites should be capable of conducting
secure transactions?

cdr



___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-01 Thread Arshad Noor

The reality is that we have no choice, but to trust the
government for its process to establish legitimate business
entities - we, the people, made it the law as part of our
civil code.  Funnily, it does work.  Every jurisdiction is
responsible for legitimizing the creation, or existence, of
a real business entity, following its own rules.

It is the disjointed trust model created by private CA's,
that introduces the cracks in the model.  This is not to say
that the government can be trusted to do the right thing -
but they already have the authority (by law), the infra-
structure (people and process) and the information (the
database of all legitimate businesses in their jurisdiction)
to make the trust model more uniform.

The ICANN analogy is not appropriate in this context, because
ICANN - even though a private non-profit entity - is beholden
to the US Dept. of Commerce by contract - the MOU they signed
many years ago requires them to meet goals established by this
US agency, thus allowing the US to influence what it does,
however small that influence might be:
(http://www.ntia.doc.gov/ntiahome/congress/2004/ICANNhearing_09302004.htm).

On the other hand, the scheme outlined in my e-mail allows
every country to retain its own rules and processes for
legitimizing businesses, simply extending that model to now
include the self-signed CA's of the authorized businesses.
No US control over anything other than that businesses
incorporated in the US would have to work through their local
Secretary of State office to get theis self-signed CA certs
validated as part of their incorporation process.

Arshad Noor
StrongAuth, Inc.


Duane wrote:
 >
Nice idea in theory, but everything works in theory, however the icann 
issue at present is the crux of the internet trust debate, other 
governments don't trust the US govt to screw them, and vice versa, I 
don't think I'd be willing to trust most governments on the matter of 
being CAs... or any for that matter...



___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-01 Thread Duane

Julien Pierre wrote:

Regardless, it is the right thing to do. If non-technical users want to 
shoot themselves in the foot, they should certainly be free to do so - 
using another browser.


And guess who your biggest users are at present, biting the hand that 
feeds you (or keeps you alive) isn't exactly a wise move...


--

Best regards,
 Duane

http://www.cacert.org - Free Security Certificates
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
http://happysnapper.com.au - Sell your photos over the net!
http://e164.org - Using Enum.164 to interconnect asterisk servers

"In the long run the pessimist may be proved right,
but the optimist has a better time on the trip."
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-01 Thread Duane

Arshad Noor wrote:


In the real world, we trust the Secretary of State (at least,
in the US) to "authenticate" businesses.  They are the only
ones authorized to issue "Certificates of Inforporation" that
legitimizes a US business.  (Similar agencies perform such
functions in other countries, to the best of my knowledge).


Nice idea in theory, but everything works in theory, however the icann 
issue at present is the crux of the internet trust debate, other 
governments don't trust the US govt to screw them, and vice versa, I 
don't think I'd be willing to trust most governments on the matter of 
being CAs... or any for that matter...


--

Best regards,
 Duane

http://www.cacert.org - Free Security Certificates
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
http://happysnapper.com.au - Sell your photos over the net!
http://e164.org - Using Enum.164 to interconnect asterisk servers

"In the long run the pessimist may be proved right,
but the optimist has a better time on the trip."
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-01 Thread Arshad Noor

While third-party verification is not the real issue, the issue
is: can the third-party itself be trusted?  Who remembers the
Verisign debacle from a few years ago with the Class-3 digital
certificates issued through a social engineering attack, in the
name of Microsoft?

http://news.com.com/2100-1001-254586.html?legacy=cnet
http://www.eweek.com/article2/0,1895,1243314,00.asp

In the real world, we trust the Secretary of State (at least,
in the US) to "authenticate" businesses.  They are the only
ones authorized to issue "Certificates of Inforporation" that
legitimizes a US business.  (Similar agencies perform such
functions in other countries, to the best of my knowledge).

It is my belief that what is needed is a new trust model, where
only the digital certificates of CA's of a federal entity of a
nation (such as that of the Office of the President) is in the
browser, and is placed in commercial browsers through a very
elaborate protocol.

The Federal CA in turn, will issue the CA certificates of the
states that are part of that federal entity (the 50 US states,
for example), who in turn will issue the CA certificate for the
office of the Secretary of State in each state.  For smaller
nations, the Federal CA might issue the certificate to the
agency that incorporates/licenses business entities, directly.

The OSOS CA will accept self-signed CA certificates from any
business entity, just as it accepts "self-signed" paper
applications to create a new business entity.  Once the paper
"Certificate of Incorporation" has been issued, the Base-64
encoded self-signed certificate of the business entity is
signed by an OSOS CA-issued certificate, chaining upto the
Federal CA certificate in the browser, thus establishing the
legal business entity on the internet.

Now, when the browser sees a self-signed certificate that
does not chain upto a Federal CA of some nation, it can
legitimately state that the server certificate appears to be
from an unknown business entity which does not appear in the
directory of the local authorizing government agency.  I don't
know of many users who will continue to click through such a
message no matter what their business need is.

Third-party CA operators (including StrongAuth) should only be
in the business of building and operating PKI's - not
establishing trust.  Until such a trust model, and a supporting
protocol to use it, is created, we can expect certificate trust
problems to only exacerbate.

Arshad Noor
StrongAuth, Inc.


Julien Pierre wrote:


What other way does the average non-technical user have to know that the 
secure website is the one truly intended and not a fake, except than to 
rely upon a third party to do the verification for them ? Self-signed 
certs certainly don't provide any of that type of assurance.

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-01 Thread Julien Pierre

Ka-Ping Yee wrote:


Refusing to accept self-signed certificates is *not* the right thing
to do.  That would only further the notion that buying a certificate
from one of dozens of approved CAs is what makes a website legitimate,
which is false.

What fraction of the 30 to 50 root CAs on your root CA list do you
know or have ever heard of?  Do you know their policies?  Do you know
their management?  Why should you trust them?

What makes a website legitimate is the fact that it is the website
you truly intended, not the fact that it happens to have paid a member
of the CA extortion ring.


What other way does the average non-technical user have to know that the 
secure website is the one truly intended and not a fake, except than to 
rely upon a third party to do the verification for them ? Self-signed 
certs certainly don't provide any of that type of assurance.


The only valid exception may be when you are connecting to your own 
hosts over a very controlled private network. In this case no third 
party verification is necessary. But most non-technical users don't do that.

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-01 Thread Ka-Ping Yee
On Tue, 1 Nov 2005, Julien Pierre wrote:
> Regardless, it is the right thing to do. If non-technical users want to
> shoot themselves in the foot, they should certainly be free to do so -
> using another browser.

Refusing to accept self-signed certificates is *not* the right thing
to do.  That would only further the notion that buying a certificate
from one of dozens of approved CAs is what makes a website legitimate,
which is false.

What fraction of the 30 to 50 root CAs on your root CA list do you
know or have ever heard of?  Do you know their policies?  Do you know
their management?  Why should you trust them?

What makes a website legitimate is the fact that it is the website
you truly intended, not the fact that it happens to have paid a member
of the CA extortion ring.


-- ?!ng
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-01 Thread Julien Pierre

cdr wrote:

Peter Gutmann wrote:


Treat it as an unrecoverable error...
...in the same format as [...] a "Server not found"-type message.  



If only it was so simple...

If this was to be done, it would quickly become the best known
example of simple-minded, ill suited for real world "I-know-best"
attitude on the part of programmer. We know users have choice,
and the net result, I predict, would be their migration to other
browsers.


Regardless, it is the right thing to do. If non-technical users want to 
shoot themselves in the foot, they should certainly be free to do so - 
using another browser.

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-01 Thread cdr

Peter Gutmann wrote:

Treat it as an unrecoverable error...
...in the same format as [...] a "Server not found"-type message.  


If only it was so simple...

If this was to be done, it would quickly become the best known
example of simple-minded, ill suited for real world "I-know-best"
attitude on the part of programmer. We know users have choice,
and the net result, I predict, would be their migration to other
browsers.

cdr

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-11-01 Thread Peter Gutmann
Nelson B <[EMAIL PROTECTED]> writes:

>Peter,

>Please spell out for us exactly what you mean by
>> "treat a cert validation failure in the same way as a network error"

>Do you mean to treat it as unrecoveragle error, with no option to override?
>or ??

Treat it as an unrecoverable error.  Providing non-technical users with an
opt-out screen and an "I'm feeling lucky" button to click on is just security
theatre, if you're serious about security then make it a nonrecoverable error
in the same format as [tabs across to Firefox to check what it says] a "Server
not found"-type message.  If the user is expecting to talk to a server in a
secure manner and the security fails, then it's a fatal error, not a one-click
speedbump to annoy them.

Peter.

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-10-31 Thread Nelson B
Peter Gutmann wrote:
> Nelson B <[EMAIL PROTECTED]> writes:
> 
>>As reported in
>>http://www.informationweek.com/shared/printableArticle.jhtml?articleID=171200010
>>phishers are now using self-signed certs on their phony web sites, to make
>>the lock icons appear for their web sites, to give the victims a false sense
>>of security. 
> 
>>Of course, the victims must first dismiss a large warnign dialog about
>>the cert coming from an unknown issuer.  But according to the article,
>>many users dismiss that dialog without any understanding of what it means.
> 
> No-one's ever done a rigorous study of this, but there is plenty of anecdotal
> evidence (e.g. the site that had a large red cross and "Invalid Certificate"
> on it that users had to click past before making multi-thousand-dollar
> payments, the bank site with an invalid cert that didn't stop 299 of 300
> users, etc etc) that cert warnings are almost completely ineffective in
> stopping users from going to a web page that they want to visit.  That's why
> the best strategy for this is to treat a cert validation failure in the same
> way as a network error: Users know how to handle this, and it puts pressure on
> site admins to get things right.

Peter,

Please spell out for us exactly what you mean by
> "treat a cert validation failure in the same way as a network error"

Do you mean to treat it as unrecoveragle error, with no option to override?
or ??

Thanks for your feedback.
-- 
Nelson B
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-10-31 Thread Peter Gutmann
Nelson B <[EMAIL PROTECTED]> writes:

>As reported in
>http://www.informationweek.com/shared/printableArticle.jhtml?articleID=171200010
>phishers are now using self-signed certs on their phony web sites, to make
>the lock icons appear for their web sites, to give the victims a false sense
>of security.

>Of course, the victims must first dismiss a large warnign dialog about
>the cert coming from an unknown issuer.  But according to the article,
>many users dismiss that dialog without any understanding of what it means.

No-one's ever done a rigorous study of this, but there is plenty of anecdotal
evidence (e.g. the site that had a large red cross and "Invalid Certificate"
on it that users had to click past before making multi-thousand-dollar
payments, the bank site with an invalid cert that didn't stop 299 of 300
users, etc etc) that cert warnings are almost completely ineffective in
stopping users from going to a web page that they want to visit.  That's why
the best strategy for this is to treat a cert validation failure in the same
way as a network error: Users know how to handle this, and it puts pressure on
site admins to get things right.

Peter.

___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto


Re: phishing web sites using self-signed certs

2005-10-29 Thread Hendrik Weimer
Nelson B <[EMAIL PROTECTED]> writes:

> I think this is further evidence that basic (not "advanced") users should
> not be able to override such cert validity errors.

Won't help much. The Phishers will start to use domain-validated certs
and I guess they won't run short of credit card numbers.

Hendrik
___
mozilla-crypto mailing list
mozilla-crypto@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-crypto