> Dr. Stephen Henson wrote:

> A determined and knowledgable attacker can subvert anything that's
> not in hardware.

        I think this is a very strange thing to say. If he has access to the
hardware, he can subvert it too. If he doesn't have access to the hardware,
how can he subvert the software?

> Pulling a cert from a server isn't that much
> harder to break given that it's trivial to set up a local DNS
> server that will redirect queries to the attacker's own server.

        So sign the cert. No hardware needed.

> (Or to simply use the same editor to replace your URL with their
> own.)

        Sure, if you have access to the software. If you have access to any
security scheme, you can simply disable the scheme.

> Another attack is to attach to the process, stop it after
> the cert has been loaded, then replace that cert with the attacker's.

        If you have that level of control over the process, you can make the
process do anything you want, but you could just do what you wanted anyway
with that level of control over the system. So what do you need the process
for?

> One positive thing: if you're operating at this level it's trivial
> to use encryption and hashing to hide the cert and verify it has
> not altered.  It's not perfect and you'll still need to embed an
> encryption key.

        If someone wants to alter the certificate that secures their own 
machine,
why should I care? You can certainly break things that you are allowed
access to.

        DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to