And from that we can deduce what?
$evil_country can't spend $10k to be able to intercept and silently MITM
all https?



2013/9/11 InterNetX - Robert Garrett <robert.garr...@internetx.com>

> also means somebody paid a lot of money for that green bar
>
>
> On 09/11/2013 04:46 PM, Janne Johansson wrote:
>
>> So you publish something on a HTTPS page, which means that when the
>> browser
>> says "green padlock", it only says: "this site was using a key signed by
>> someone who in turn was signed by someone out of a few hundred CAs in a
>> list which include companies in scary countries*". That will help a lot.
>>
>>
>> *) Please exchange the list of scary countries to whatever scares you in
>> your particular example. For Syria it could be the US, for US it could be
>> Syria. Or some other combination of opposition.
>>
>>
>>
>> 2013/9/11 Valentin Zagura <put...@gmail.com>
>>
>>  Thanks for the suggestion, we will probably order the CD.
>>>
>>> But on the other hand, I hope that you realize that people in some
>>> countries (Iran, China, Egypt, Syria) would not have this possibility and
>>> they could be more affected by a compromise than we would be (they might
>>> probably pay with their lives) and I hope you guys are also thinking of
>>> them.
>>>
>>> Thanks,
>>> Valentin Zagura
>>>
>>>
>>> On Wed, Sep 11, 2013 at 1:58 PM, Peter N. M. Hansteen <pe...@bsdly.net
>>>
>>>> wrote:
>>>>
>>>
>>>  On Wed, Sep 11, 2013 at 01:49:14PM +0300, Valentin Zagura wrote:
>>>>
>>>>  We are going to use a OpenBSD system in a PCI-DSS compliant
>>>>>
>>>> environment.
>>>
>>>> Is there any way we can prove to our PCI-DSS assessor that the OpenBSD
>>>>> image we use for our installation can be checked so that it is the
>>>>>
>>>> correct
>>>>
>>>>> one (is not modified in a malicious way by a third party) ?
>>>>>
>>>>
>>>> Probably not what you want to hear, but starting with
>>>> http://www.openbsd.org/orders.**html<http://www.openbsd.org/orders.html>
>>>> is usually an excellent idea in this context. Verifiably delivered from
>>>> a
>>>> trusted source.
>>>>
>>>>  A https link to some kind of ISO checksum or something similar (but
>>>>>
>>>> using
>>>
>>>> strong cryptography) I think would do it, but I could not find any
>>>>>
>>>> (except
>>>>
>>>>> a line in the FAQ stating "If the men in black suits are out to get
>>>>>
>>>> you,
>>>
>>>> they're going to get you." which is not the case :) )
>>>>>
>>>>
>>>> It's possible some of the more prominent entries on
>>>> http://www.openbsd.org/**support.html<http://www.openbsd.org/support.html>
>>>> could be persuaded to provide something like that (M:Tier comes to mind,
>>>> but why are
>>>> they not on that page?) in exchange for a reasonable fee.
>>>>
>>>> But again, for -RELEASE, the CD sets are a good starting point.
>>>>
>>>> - Peter
>>>>
>>>> --
>>>> Peter N. M. Hansteen, member of the first RFC 1149 implementation team
>>>> http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
>>>> "Remember to set the evil bit on all malicious network traffic"
>>>> delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
>>>>
>>>>
>>>
>>
>>
>>
>
> Mit freundlichen Grüßen
>
> Robert Garrett
> Senior System Engineer
> Technical Projects & Solutions
> --
> InterNetX GmbH
> Maximilianstr. 6
> 93047 Regensburg
> Germany
>
> Tel. +49 941 59559-480
> Fax  +49 941 59559-245
>
> www.internetx.com
> www.facebook.com/InterNetX
> www.twitter.com/InterNetX
>
> Geschäftsführer/CEO: Thomas Mörz
> Amtsgericht Regensburg, HRB 7142
>
>


-- 
May the most significant bit of your life be positive.

Reply via email to