The article is very wishy-washy about "forged certificates".  This
usually means that either 1) a CA is willing/coaxed/forced to issue a
certificate with CN=bankofamerica.com for a private key owned by the
government of country Mallory or 2) Mallory has obtained the CA's
certificate signing private key and can issue certificates with any
CN.  In both cases, the process is broken - this CA has become
untrustworthy to issue server SSL certificates.  Detecting the
untrustworthiness is unfortunately not easy.  Case 1 is usually
handled by reviewing the CA's policies and practices for issuing
certificates.  CAs usually have to be audited and certified by
independent organizations before a browser would trust them.  To
prevent case 2, CAs are supposed to keep their certificates safe and
revoke them if a suspicion arises that the key is not safe.

Transparent SSL proxies are otherwise nothing new and are used allow
IDS and IPS devices to detect attacks hidden inside SSL traffic.  An
example is Netronome's SSL Inspector, which has been commercially
available for years now.  The device from Packet Forensics seems to be
just that - a transparent SSL proxy.  I'm not sure why it's existence
is hidden and not advertised publicly.

Best Regards,
Peter Djalaliev






On Mar 29, 11:11 am, Jean-Marc Desperrier <[email protected]> wrote:
> Jean-Marc Desperrier wrote:
> > Article on Wired here :
> >http://www.wired.com/threatlevel/2010/03/packet-forensics/
>
> The original article is well worth reading also 
> :http://files.cloudprivacy.net/ssl-mitm.pdf
>
> Especially the certlock Firefox extension they propose, which builds
> upon Kaie's Conspiracy, but does something more sophisticated.
> Unfortunately it seems it has not been made publicly available until now.

-- 
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to