[110433] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Security team successfully cracks SSL using 200 PS3's and MD5

daemon@ATHENA.MIT.EDU (Randy Bush)
Mon Jan 5 16:09:45 2009

Date: Tue, 06 Jan 2009 06:09:34 +0900
From: Randy Bush <randy@psg.com>
To: Joe Abley <jabley@hopcount.ca>
In-Reply-To: <8A9328FD-EEAB-4CCB-A073-0775D71BFB2E@hopcount.ca>
Cc: "nanog@nanog.org" <nanog@nanog.org>, Joe Greco <jgreco@ns.sol.net>
Errors-To: nanog-bounces@nanog.org

On 09.01.06 05:59, Joe Abley wrote:
>> perhaps i am a bit slow. but could someone explain to me how trust in
>> dns data transfers to trust in an http partner and other uses to which
>> ssl is put?
>
> If I can get secure answers to "www.bank.example IN CERT?" and
> "www.bank.example IN A?" then perhaps when I connect to
> www.bank.example:443 I can decide to trust the certificate presented by
> the server based on the trust anchor I extracted from the DNS, rather
> than whatever trust anchors were bundled with my browser.
>
> That presumably would mean that the organisation responsible for
> bank.example could run their own CA and publish their own trust anchor,
> without having to buy that service from one of the traditional CA
> companies.
>
> No doubt there is more to it than that. I don't know anything much about
> X.509.

x.509 is not the issue.  it is your assumption that dns trust is 
formally transferrable to ssl/tls cert trust.

to use your example, the contractor who serves dns for www.bank.example 
could insert a cert and then fake the web site having (a child of) that 
cert.  whereas, if the site had its cert a descendant of the ca for all 
banks, this attack would fail.

and i am not interested in quibbling about banks and who issues root 
cas.  the point is that there are two different trust models here, and 
trust is not transitive.

but then again, i have not even had coffee yet this morning.

randy


home help back first fref pref prev next nref lref last post