[18302] in bugtraq

home help back first fref pref prev next nref lref last post

Re: "The End of SSL and SSH?"

daemon@ATHENA.MIT.EDU (Darren Reed)
Thu Dec 21 20:26:42 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Message-Id:  <200012212159.IAA24192@caligula.anu.edu.au>
Date:         Fri, 22 Dec 2000 08:59:05 +1100
Reply-To: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
From: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
X-To:         mrex@sap-ag.de
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <200012211520.QAA19665@hw1464.wdf.sap-ag.de> from Martin Rex at
              "Dec 21, 0 04:20:03 pm"

In some mail from Martin Rex, sie said:
[...]
> (1) the significance of a secure key storage.
>
>   SSL:  All Web-Browsers that I know keep Root-CA certificates in software
>         and it is quite possible for software to modify Root-CA certs
> 	or to add new Root-CA certs, which subverts the whole
>         PKI trust model.

No, it just subverts the implementation whereby the browser doesn't
bother you if it can find a path back to a root-CA for a X.509 cert
associated with whatever cert it has been given.

For Netscape there is a builtin MIME type that cannot be disabled
which invokes the root CA installation code.  10:1 most people would
click "ok" to install a root CA if so prompted from a random web site.
Now that's without even doing anything nasty.

[...]
>   SSL:  Web-Browsers area shipped with >100 preconfigured CA certs
>         these days.  Most Browsers can be downloaded via the Internet,
>         but many of the distributions are still not signed --
>         how do you know they haven't been backdoored with additional
>         Root-Certs?

How do you know there is any integrity at all in those preconfigured ?
What's to say that 10 of them aren't controlled by some mafia ?  I'll
let the conspiracy theorists goto town on that note.

Darren

home help back first fref pref prev next nref lref last post