[17274] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: What happened with the session fixation bug?

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Tue May 31 11:57:25 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: "James A. Donald" <jamesd@echeque.com>
Cc: cryptography@metzdowd.com, cypherpunks@lne.com
In-Reply-To: Your message of "Sat, 07 May 2005 14:03:07 PDT."
             <427CCA9B.29132.760A1FC@localhost> 
Date: Mon, 30 May 2005 21:17:57 -0400

In message <427CCA9B.29132.760A1FC@localhost>, "James A. Donald" writes:
>    --
>PKI was designed to defeat man in the middle attacks
>based on network sniffing, or DNS hijacking, which
>turned out to be less of a threat than expected.
>
First, you mean "the Web PKI", not PKI in general.

The next part of this is circular reasoning.  We don't see network 
sniffing for credit card numbers *because* we have SSL.  Since many of 
the worm-spread pieces of spyware incorporate sniffers, I'd say that 
part of the threat model is correct.

As for DNS hijacking -- that's what's behind "pharming" attacks.  In 
other words, it's a real threat, too.

		--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post