On Tuesday, June 20, 2017 at 2:27:10 PM UTC-4, mfi...@fortmesa.com wrote:
> On Tuesday, June 20, 2017 at 2:06:00 PM UTC-4, Jonathan Rudenberg wrote:
> > > On Jun 20, 2017, at 10:36, mfisch--- via dev-security-policy 
> > > <dev-security-policy@lists.mozilla.org> wrote:
> > > 
> > > On Monday, June 19, 2017 at 7:37:23 PM UTC-4, Matt Palmer wrote:
> > >> On Sun, Jun 18, 2017 at 08:17:07AM -0700, troy.fridley--- via 
> > >> dev-security-policy wrote:
> > >>> If you should find such an issue again in a Cisco owned domain, please
> > >>> report it to ps...@cisco.com and we will ensure that prompt and proper
> > >>> actions are taken.
> > >> 
> > >> I don't know, this way seems to have worked Just Fine.
> > >> 
> > >> - Matt
> > > 
> > > Does no-one else see the lack of responsible disclosure in this thread 
> > > distressing?
> > > 
> > > Yes, the cert was revoked, and for all you know during the race that was 
> > > this public disclosure there could have been compromise. There are APT 
> > > actors watching this thread right now looking for opportunities.
> > 
> > The disclosure looks responsible to me.
> > 
> > The domain resolves to 127.0.0.1, which means that the private key can only 
> > be effectively leveraged by a privileged attacker that can forge DNS 
> > responses. An attacker that can do this can almost certainly also block 
> > online OCSP/CRL checks, preventing the revocation from being seen by 
> > clients. In general, revocation will not have any meaningful impact against 
> > misuse unless the certificate is included in OneCRL/CRLSets (for 
> > Firefox/Chrome).
> > 
> > Jonathan
> 
> Koen,
>   Cheers on the find and thanks for your contribution.
> 
> Jonathan,
> 
>   Is your argument that TLS checking on session key disclosure is not 
> necessary because man in the middle is game over?
> 
>   You're right there are only very limited ways this sort of thing can be 
> used (and maybe it can't be used at all). But it would be difficult to argue 
> effectively that:
> 
> a) It can't be used under specific circumstances to weaken security and 
> possibly combine with other attacks.
> 
> b) That someone who recognized this for what it was did not reasonably 
> believe it _shouldn't_ be public knowledge.
> 
> c) I acknowledge your point about the effectiveness of revocation.
> 
> My issue is not in fact with the disclosure at all, but the fact that noone 
> else on this thread pointed out that it is not the ideal disclosure 
> methodology (at least in order of events). It's now been said.
> 
> Both Cisco and the CA maintain infosec incident handling teams that are paid 
> specifically to handle these situations. Yes its true corporate infosec fails 
> a lot too, but a head start is ethical.
> 
> The culture of our industry needs to think hard about the power it wields so 
> it is not taken from us and wrapped up in ineffective and burdensome state 
> oversight.

ps, it was noted previously that if other cisco properties are a bit free 
wheeling with their cookie security it would be possible to leak.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to