Hello,

I'm sorry, I do not understand the idea of providing different trees and
proofs to different parties.

If I understand correctly, it should be prevented by Auditors and the
gossip protocol (yes, I understand it is not specified in fact). Auditors
and gossip protocol are designed for solving precisely this case.
The other possibility is that the Merkle tree is not neither append-only
nor verifiable.

We should have an perfect MITM that can intercept all the communications by
the victim and her/his software to turn this scenario into real life.

And, BTW, if we ask for more than one SCT in the cert as Ben does, the
attack becomes much more difficult even for the perfect MITM.

Thank you!


On Wed, Sep 24, 2014 at 10:18 PM, Tao Effect <cont...@taoeffect.com> wrote:

> Dear [therightkey] list,
>
> This post explains how undetected MITM attacks still remain possible even
> if Google's Certificate Transparency (CT) becomes widely deployed, and it
> dissects many of Google's false and misleading claims about it.
>
> Many thanks go to Zaki (@zmanian), Simon (@simondlr) and others to
> reviewing it prior to publication:
>
>
> http://blog.okturtles.com/2014/09/the-trouble-with-certificate-transparency/
>
> Kind regards,
> Greg
>
> --
> Please do not email me anything that you are not comfortable also sharing with
> the NSA.
>
>
> _______________________________________________
> therightkey mailing list
> therightkey@ietf.org
> https://www.ietf.org/mailman/listinfo/therightkey
>
>


-- 
SY, Dmitry Belyavsky
_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to