Re: [Evolution] SSL certificates and Man in the Middle attacks

2012-09-13 Thread Pete Biggs

> Right then, if you are all saying that my premise ("perhaps some CAs
> deliver certificates for domains that are not actually demonstrably
> owned by the requester") is utterly wrong, and that the myriad of CAs we
> provide by default are all trustworthy, then the system is, I guess,
> trustworthy.
> 
> Just wanted to make sure :)

Trust is a personal thing.  The bundle of trusted certificates provided
with a distro/OS are those that the maintainers have decided are
trustworthy, hopefully by examining the chain of keys that those
certificates are signed with.  Only you can decide if you trust the
source of that bundle, and hence trust the certificates.  If you don't,
then remove the bundle and then add only those certificates that you
personally trust, and that come from sources that you can verify.

P.

___
evolution-list mailing list
evolution-list@gnome.org
To change your list options or unsubscribe, visit ...
https://mail.gnome.org/mailman/listinfo/evolution-list


Re: [Evolution] SSL certificates and Man in the Middle attacks

2012-09-12 Thread Jeff Fortin
Right then, if you are all saying that my premise ("perhaps some CAs
deliver certificates for domains that are not actually demonstrably
owned by the requester") is utterly wrong, and that the myriad of CAs we
provide by default are all trustworthy, then the system is, I guess,
trustworthy.

Just wanted to make sure :)

___
evolution-list mailing list
evolution-list@gnome.org
To change your list options or unsubscribe, visit ...
https://mail.gnome.org/mailman/listinfo/evolution-list


Re: [Evolution] SSL certificates and Man in the Middle attacks

2012-09-10 Thread Adam Tauno Williams
On Mon, 2012-09-10 at 10:26 +0200, Bastien Durel wrote: 
> Le dimanche 09 septembre 2012 à 22:40 -0400, Jeff Fortin a écrit :
> As users (mostly) ignore security warnings[1], it should be useless,
> IMHO.
> SSH does not targets same users than browsers or mail readers, so users
> are more likely to read them. (And SSH keys doesn't expires, so you can
> keep fingerprints for ages)
> [1] http://lorrie.cranor.org/pubs/sslwarnings.pdf

Yep, after 20+ years as a System & Network Administrator I can tell you
with complete certainty that 99.44% of users just-hit-accept when they
see an invalid-certificate notice.  The only solution is a policy which
disables accepting untrusted certificates [and what a nightmare that is
as there are *many* commerce sites that use expired or self-signed
certificates ].

There is no issue with how GNOME or Evolution manages certificates. 



signature.asc
Description: This is a digitally signed message part
___
evolution-list mailing list
evolution-list@gnome.org
To change your list options or unsubscribe, visit ...
https://mail.gnome.org/mailman/listinfo/evolution-list


Re: [Evolution] SSL certificates and Man in the Middle attacks

2012-09-10 Thread Andre Klapper
On Mon, 2012-09-10 at 10:26 +0200, Bastien Durel wrote:
> As users (mostly) ignore security warnings[1], it should be useless,
> IMHO.

Nice, didn't know that paper. I normally point to
http://www.cs.auckland.ac.nz/~pgut001/pubs/phishing.pdf page 5 as
another quick explanation of the effect of such dialogs to the user.

andre
-- 
mailto:ak...@gmx.net | failed
http://blogs.gnome.org/aklapper

___
evolution-list mailing list
evolution-list@gnome.org
To change your list options or unsubscribe, visit ...
https://mail.gnome.org/mailman/listinfo/evolution-list


Re: [Evolution] SSL certificates and Man in the Middle attacks

2012-09-10 Thread Bastien Durel
Le dimanche 09 septembre 2012 à 22:40 -0400, Jeff Fortin a écrit :
> Hi there,
> As far as I can tell, Evolution uses a default set of SSL certificate
> authorities.
> 
[...]
> 
> Will the user get (I hope) a big scary "SOMETHING IS VERY WRONG" warning
> like SSH does when server fingerprints don't match?
> 
> I'm of course not a security expert, but would like some reassurance
> that Evolution is actually safe against this scenario.
> Thanks
As users (mostly) ignore security warnings[1], it should be useless,
IMHO.
SSH does not targets same users than browsers or mail readers, so users
are more likely to read them. (And SSH keys doesn't expires, so you can
keep fingerprints for ages)

[1] http://lorrie.cranor.org/pubs/sslwarnings.pdf

-- 
Bastien Durel

___
evolution-list mailing list
evolution-list@gnome.org
To change your list options or unsubscribe, visit ...
https://mail.gnome.org/mailman/listinfo/evolution-list


Re: [Evolution] SSL certificates and Man in the Middle attacks

2012-09-10 Thread Pete Biggs

> 
> However, I've been told that the Certificate Authorities system is
> fundamentally flawed, in the sense that CAs don't communicate with each
> other, any of them can sign for any domain name, and I've been told some
> CAs are quite un-trustworthy. This is a scary prospect.

Are you saying that a trusted CA might sign an SSL certificate for a
domain that the requester doesn't own.  I find that surprising.  The
whole point of the trusted CA system is that you *can* trust them to do
the correct thing - and the correct thing is for them to verify that you
have the right to request a signed certificate for a particular domain.

> 
> Now, I never had to "accept" the certificate for Google to use GMail
> through IMAP. To be honest, I would have expected some sort of prompt
> that says, "Hey, this is the first time you're connecting to that
> host... are you certain that you are on a trusted network connection and
> the host you are connecting to is really the one it claims to be?"...

No, the point of the trusted CA system is that you aren't presented with
those sorts of prompts.  If you are concerned about this, remove the
trusted CA certificates from your system, you will then be asked to
verify every new certificate your machine comes across.

> 
> My question is thus the following: if the user is not the one manually
> vetting the certificates, what happens when someone tries to do a
> man-in-the-middle attack (ie: you're on an untrusted wifi, someone tries
> to impersonate the GMail IMAP servers and provide a valid, signed
> certificate that is different from Google's)?

That requires the attacker to have a valid signed certificate, signed by
a trusted CA, for Google's servers

> 
> Will the user get (I hope) a big scary "SOMETHING IS VERY WRONG" warning
> like SSH does when server fingerprints don't match?

 No, if the certificate seen by the underlying SSL mechanism is trusted,
then you will not get any warnings ... because it's trusted.

> 
> I'm of course not a security expert, but would like some reassurance
> that Evolution is actually safe against this scenario.

Evolution uses the same underlying SSL subsystem that the rest of your
machine uses, so it is as safe as, say, the https protocol - and I
suspect you put considerably more trust in that than you do in an
encrypted IMAP connection.

P.



___
evolution-list mailing list
evolution-list@gnome.org
To change your list options or unsubscribe, visit ...
https://mail.gnome.org/mailman/listinfo/evolution-list