On Thu, Nov 18, 2004 at 09:33:05AM -0800, JD Conley wrote:
> If an attacker attempts to connect and provides a certificate that is
> not on record for the host they are claiming to be, a dialback is
> performed against the authority of the host.  The attacker, unless they
> have control of DNS or the other host's network, is then rejected as the
> dialback authority would produce a certificate that is not the same as
> the attacker's.

But the attacker hast to take over the DNS only once. After that his
certificate is "trusted" and he can use the faked domain without
problems. With pure dialback he would have to keep the DNS compromised
all the time he wants to use the faked domain.

Greets,
        Jacek
_______________________________________________
jdev mailing list
[EMAIL PROTECTED]
http://mail.jabber.org/mailman/listinfo/jdev

Reply via email to