[141070] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Security by asking the drunk whether he's drunk

daemon@ATHENA.MIT.EDU (dan@geer.org)
Thu Dec 25 14:56:20 2008

From: dan@geer.org
To: Adam Shostack <adam@homeport.org>
cc: cryptography@metzdowd.com
In-Reply-To: Your message of "Sun, 21 Dec 2008 16:51:16 EST."
             <20081221215116.GA27445@homeport.org> 
Date: Tue, 23 Dec 2008 17:23:07 -0500


or asking "Can I trust you?"

-------------------------------------------------------

http://blog.startcom.org/?p=145

Slashdot and others are reporting on this story about how it was
possible for a person to receive a completely valid certificate for
a random domain of his choosing without any questions or verification.
In this case he generated a certificate for mozilla.com from a
reseller of the Comodo certificate authority.  I'm hoping this is
just a single instance but it makes you remember that the browser
pre-trusted certificate authorities really needs to be cleaned up.

If it's not obvious enough, this is not good for Tor users due to
the fact that we try to rely on SSL certificates to make sure that
traffic isn't sniffed while using Tor.

-Roc Tor Admin

-------------------------------------------------------

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post