[145191] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Law Enforcement Appliance Subverts SSL

daemon@ATHENA.MIT.EDU (dan@geer.org)
Thu Mar 25 11:14:02 2010

From: dan@geer.org
To: Rui Paulo <rpaulo@gmail.com>
cc: cryptography@metzdowd.com
In-Reply-To: Your message of "Wed, 24 Mar 2010 19:14:55 -0000."
             <4B0F790D-5073-46F2-8CF0-70E059246765@gmail.com> 
Date: Thu, 25 Mar 2010 08:58:33 -0400


Rui Paulo writes:
-+---------------
 | http://www.wired.com/threatlevel/2010/03/packet-forensics/
 | 
 | "At a recent wiretapping convention however, security researcher Chris =
 | Soghoian discovered that a small company was marketing internet spying =
 | boxes to the feds designed to intercept those communications, without =
 | breaking the encryption, by using forged security certificates, instead =
 | of the real ones that websites use to verify secure connections. To use =
 | the appliance, the government would need to acquire a forged certificate =
 |  from any one of more than 100 trusted Certificate Authorities."
 | 


I rather like Cormac Herley's paper:

  http://preview.tinyurl.com/yko7lhg
  So Long, And No Thanks for the Externalities:
  The Rational Rejection of Security Advice by Users

which I cite here for this line:

  It is hard to blame users for not being interested in SSL
  and certificates when (as far as we can determine) 100% of
  all certificate errors seen by users are false positives.



--dan

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post