Dear Dmitry,

Thank you for the reply.

On Sep 25, 2014, at 6:40 AM, Dmitry Belyavsky <beld...@gmail.com> wrote:

> If I understand correctly, it should be prevented by Auditors and the gossip 
> protocol (yes, I understand it is not specified in fact). Auditors and gossip 
> protocol are designed for solving precisely this case.

Well, please reply with the details of gossip.

This blog post was simply a more formal way of restating an email I'd brought 
up on [trans] back in May.

I pointed out back then that gossip was essential if this attack is to have any 
hope of being detected, and I am still waiting for those details.

> And, BTW, if we ask for more than one SCT in the cert as Ben does, the attack 
> becomes much more difficult even for the perfect MITM.


Define "much more"? If we're dealing with "the perfect MITM", they might own 
one of the CAs, and then only need to send an NSL to another (or hack another). 
Not too difficult for "the perfect MITM".

Kind regards,
Greg Slepak

--
Please do not email me anything that you are not comfortable also sharing with 
the NSA.

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to