I don't understand your question, but I'll attempt to rephrase my comment.

Brad was describing a network attacker that was able to obtain a DV
certificate (but not an EV certificate) for a target site. The
attacker can "act as a partial MITM and provide, using a DV
certificate, trojan script content in an iframe with no security
indicators or substitute an external script in a legitimate page and
that script will have full access to content delivered with an EV
certificate." This would allow, for example, the attacker to read
cookies and passwords entered into a bank's login form.

My point is that if the site is using LockEV, the network attacker's
DV certificate is useless, so LockEV is useful even if the browser's
script access checks don't pay attention to the EV/DV distinction.

On Mon, Aug 13, 2012 at 2:00 PM, Paul Hoffman <[email protected]> wrote:
> On Aug 13, 2012, at 12:21 PM, Collin Jackson wrote:
>
>> On Mon, Aug 13, 2012 at 10:58 AM, Hill, Brad <[email protected]> wrote:
>>> There are, of course, non-browser HTTP clients that may respect HSTS, but 
>>> EV certificates in particular are aimed at a browser audience as it is 
>>> about user trust indicators.
>>>
>>> EV is *not* a security boundary in browsers, however.  It is a brand 
>>> awareness and consumer trust product.
>>>
>>> I am not aware of any user agents that treat EV and non-EV content as 
>>> having different effective security principals for purposes of the Same 
>>> Origin Policy.  So, although it is more difficult to get an EV certificate 
>>> than a DV one, that does not provide any effective security against a MITM 
>>> attacker who can obtain a DV certificate.  Such an attacker can always act 
>>> as a partial MITM and provide, using a DV certificate, trojan script 
>>> content in an iframe with no security indicators or substitute an external 
>>> script in a legitimate page and that script will have full access to 
>>> content delivered with an EV certificate.
>>>
>>> I would posit that means a feature like LockEV has little to no practical 
>>> value unless and until (not likely) Web user agents provide origin 
>>> isolation between EV and non-EV content.
>>
>> Quite the opposite, you just made the argument in favor of LockEV. If
>> LockEV is being used, the MITM attack with a DV certificate would no
>> longer be possible, because the DV certificate would not be accepted
>> by the browser.
>
> In what case is that attack useful? The public key would still be the one 
> that the site thought they had an EV cert for.
>
> Confused...
>
> --Paul Hoffman
_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to