[5396] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: going around the crypto

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Sat Aug 14 12:37:44 1999

To: "MIKE SHAW" <mas@sbscorp.com>
Cc: cryptography@c2.net
Date: Fri, 13 Aug 1999 12:38:12 -0400
From: "Steven M. Bellovin" <smb@research.att.com>

In message <s7b4019f.007@sbscorp.com>, "MIKE SHAW" writes:
> It's my understanding that in order to exploit this, you'd have to essentiall
> y
> set yourself up as a proxy after sending the RDP advert  If this is the case,
>  
> wouldn't the fact that the man in the middle did not have the cert that
> corresponded to the domain name cause at least one warning for most
> browsers?  ('certificate name check' in netscape, 'wrong certificate name' in
> Opera).  Otherwise, you'd just be acting as a router and SSL would prevent
>  sniffing.  Am I missing something?

Not as a proxy, since that's a different protocol from the host, but as the 
end-system.  Yes, you have to issue yourself a fake certificate, but I suspect 
that that's not an insurmountable problem.  And of course, that certificate is 
signed by someone you've invented with a plausible name -- probably something 
corresponding to the name of the site you're impersonating.  Say, "Amazon.com 
Electronic Security Services" or some such.




home help back first fref pref prev next nref lref last post