On Saturday 16 January 2010 10:56:29 Vadkan Jozsef wrote:
> ..I mean does an outdated self-signed certificate give the same security
> as a normal cert?
It depends on what you mean by security. You do get the same level of end-to-
end encryption -- so attackers attempting to read the connection after it has
been established will be stymied.
However, you do not get the same level of authenticity verification. So, you
don't know the validity of the end point you are negotiating with. This
allows an attacker to attack the connection setup -- a man-in-the-middle
attack. A successful man-in-the-middle attack results in total compromise of
the data transferred; the attacker can both record and manipulate the data
exchanged in either direction or both.
Depending on the user agent (browser), once the user has accepted a self-
signed certificate for a certain domain the user might not be prompted about
the same certificate (based on secure hash) for the same domain. In this
case, if the first connection was NOT intercepted, future connections would
NOT be subject to man-in-the-middle attack. Also, if the first connection WAS
intercepted and future connections were NOT, the user would be prompted
because the certificate presented would have changed (based on secure hash).
Finally, if users or user agents can be transmitted the expected hash of a
self-signed certificate presented by a certain domain using a secure path
prior to establishing the connection, the self-signed certificate is as good
as one with a cert chain ending in a CA. The CA infrastructure is established
as a means of confirming the hash <-> domain mapping without every site having
to communicate their hash to every potential user.
--
Boyd Stephen Smith Jr. ,= ,-_-. =.
b...@iguanasuicide.net ((_/)o o(\_))
ICQ: 514984 YM/AIM: DaTwinkDaddy `-'(. .)`-'
http://iguanasuicide.net/\_/
signature.asc
Description: This is a digitally signed message part.