* Jean-Michel besnard <[EMAIL PROTECTED]> ([EMAIL PROTECTED]) [030909 12:47]: > Hi, > > On Tue, Sep 09, 2003 at 09:00:28PM +0200, Joerg Rossdeutscher wrote: > > Hi, > > > > Am So, 2003-09-07 um 23.44 schrieb Colin Watson: > > > On Sun, Sep 07, 2003 at 09:46:02PM +0200, Joerg Rossdeutscher wrote: > > > > Am So, 2003-09-07 um 21.11 schrieb Mario Vukelic: > > > > > You probably don't even get security fixes fo NS 4 anymore! > > > > > > > > Uninteresting, since one would use NS4 only with the bank's site. They > > > > don't need to hack me. They own everything I have... :-) > > > > > > Whoa, sure it's interesting. Consider a man-in-the-middle SSL attack: > > > now somebody else owns everything you have. > > You can not really mount a man-in-the-middle attack if the bank's certificate (and > therefore the public key contained in it) has been signed by a trusted entity (eg, a > CA). > > or maybe I am wrong....
That's what makes it an attack. ISTR an exploit in IE which would allow anyone with a trusted cert to impersonate any other site. For example, if I got a cert for doorstop.net signed by verisign, I could then pull off a MITM and pretend to be amazon.com, thereby grabbing credit card numbers, etc. I may be a bit off base on my recollection of the exploit; I mostly remember just chuckling to myself when I read the CERT alert. =) The whole point is that a buggy browser could make it easy for someone to pull something like this off, wherein the browser might be validating certs incorrectly, or just not warning the user when it failed to validate, or whatnot. good times, Vineet -- http://www.doorstop.net/ -- I am mortified to be told that, in the United States of America, the sale of a book can become a subject of inquiry, and of criminal inquiry too. -- President Thomas Jefferson
pgp00000.pgp
Description: PGP signature