[32502] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Carnivore Update - Washington Post 11/21/00

daemon@ATHENA.MIT.EDU (Sean Donelan)
Fri Nov 24 04:49:35 2000

Date: 24 Nov 2000 01:47:25 -0800
Message-ID: <20001124094725.14404.cpmta@c004.sfo.cp.net>
Content-Type: text/plain
Content-Disposition: inline
Mime-Version: 1.0
To: avg@kotovnik.com
From: Sean Donelan <sean@donelan.com>
Cc: nanog@merit.edu
Errors-To: owner-nanog-outgoing@merit.edu


On Thu, 23 November 2000, Vadim Antonov wrote:
> I do not think that carnivore is doing that, but SSL is not resistant to
> the man-in-the-middle attack.  The problem here is in the lack of any
> useful certificate validation support.  How many users actually check that
> site certificate indeed belongs to whoever is identified as the site owner
> on the Web pages?

My understanding of Carnivore is it sits as a Man-On-The-Side, not a man-in-
the-middle.  Carnivore is exactly the type of evesdropping Diffie-Hillman is
supposed to protect against.

> (Plus, it depends on the security of certification autority's private
> keys, their public parts being non-revokable, because they are bundled
> with browser software. I have a little doubt that it is all too easy for
> law enforcement to obtain these keys if they need to.  Interests of my
> privacy definitely do not match interests of RSA Cert. Auth., Inc, a
> commercial entity. Of course, i have no proof that this happened, but I
> have no reason to trust that it didn't happen, too.)

I was not aware that Terrorists'R'Us got their certificates from RSA.  Besides
wouldn't it violate some trading with the enemy law for a reputable certificate
authority to sell certificates to known terrorists?  Unless, of course, the
real targets for the survellience are someone else.




home help back first fref pref prev next nref lref last post