RE: going around the crypto

1999-08-25 Thread Donahue, Edward
: Marc Horowitz [SMTP:[EMAIL PROTECTED]] > Sent: Sunday, August 22, 1999 1:24 AM > To: RL 'Bob' Morgan > Cc: [EMAIL PROTECTED]; Peter Gutmann > Subject: Re: going around the crypto > > "RL 'Bob' Morgan" <[EMAIL PROTECTED]> writes: > >

Re: going around the crypto

1999-08-23 Thread Tom Weinstein
Marcus Leech wrote: > > "Steven M. Bellovin" wrote: > > > > It's clearly not automatic, but I suspect it would work > > > User behaviour is the weak point here--while the browsers WILL notify > you that the cert is signed by a CA you don't recognize, they also > give you the option of acc

Re: going around the crypto

1999-08-22 Thread Marc Horowitz
"RL 'Bob' Morgan" <[EMAIL PROTECTED]> writes: >> It is my understanding that MIT has a number of widely-used web >> applications (eg student registration) that have been using only client >> certs for authentication for a couple of years with reasonable success. >> You might say that this makes

Fingerprints and smart cards (was: going around the crypto)

1999-08-21 Thread Rick Smith
Peter Gutman said: >> Smart cards with thumbprint readers are one step in this >> direction, although they're currently prohibitively expensive. American Biometrics (www.abio.com) has their Biomouse II, which I once heard was supposed to retail around $250 or so. The old finger-only Biomouse sho

Re: going around the crypto

1999-08-21 Thread Tom Weinstein
Michael Helm wrote: > > > > > The attacker could also present a certficate from a fake CA with an > > > > appropriate name -- say, "Netscape Security Services", or something that > > > Right. In which case Netscape brings up a different dialog which > > > says that the server certificate is signe

Re: going around the crypto

1999-08-21 Thread Marcus Leech
"Steven M. Bellovin" wrote: > > It's clearly not automatic, but I suspect it would work > User behaviour is the weak point here--while the browsers WILL notify you that the cert is signed by a CA you don't recognize, they also give you the option of accepting the cert, which most users wi

Re: going around the crypto

1999-08-21 Thread RL 'Bob' Morgan
> This isn't really a problem with the servers though, the problem lies > in the fact that client-side certs are (effectively) unworkable. I > know of a number of organisations who wanted to use them and ran into > so many problems just with pilots involving small numbers of > (presumably) exper

Re: going around the crypto

1999-08-17 Thread Enzo Michelangeli
- Original Message - From: Peter Gutmann <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Saturday, August 14, 1999 6:03 AM Subject: Re: going around the crypto [...] > Smart cards with thumbprint readers are one step in this > direction, although they're

RE: going around the crypto

1999-08-14 Thread Peter Gutmann
Alan Ramsbottom <[EMAIL PROTECTED]> writes: >IE5 gives you one or more warnings (unknown CA, invalid cert date, URL-CN >mismatch) and asks if you want to proceed. > >It can also check CRLs, but the feature is disabled by default (doubtless on >standards/compatibility grounds). Performance ground

RE: going around the crypto

1999-08-14 Thread Alan Ramsbottom
> At one point, IE wouldn't even give you the option of continuing > the connection. I'm not sure what it does now. IE5 gives you one or more warnings (unknown CA, invalid cert date, URL-CN mismatch) and asks if you want to proceed. It can also check CRLs, but the feature is disabled by default

Re: going around the crypto

1999-08-14 Thread Michael Helm
> > > The attacker could also present a certficate from a fake CA with an > > > appropriate name -- say, "Netscape Security Services", or something that > > Right. In which case Netscape brings up a different dialog which > > says that the server certificate is signed by an unrecognized > > CA. A

Re: going around the crypto

1999-08-14 Thread Tom Weinstein
"Steven M. Bellovin" wrote: > > The obvious protection is for users to check the certificate. Most users, of > course, don't even know what a certificate is, let alone what the grounds are > for accepting one. It would also help if servers used client-side > certificates for authentication, sin

Re: going around the crypto

1999-08-14 Thread Peter Gutmann
"Steven M. Bellovin" <[EMAIL PROTECTED]> writes: >The obvious protection is for users to check the certificate. Most users, of >course, don't even know what a certificate is, let alone what the grounds are >for accepting one. It would also help if servers used client-side >certificates for auth

RE: going around the crypto

1999-08-14 Thread Tim Dierks
PROTECTED] [mailto:[EMAIL PROTECTED]]On > Behalf Of Steven M. Bellovin > Sent: Friday, August 13, 1999 7:17 AM > To: [EMAIL PROTECTED] > Subject: going around the crypto > > > The L0pht has issued a new advisory for an routing-type attack that can, > they say, allow for man-in-

Re: going around the crypto

1999-08-14 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, EKR writes: > "Steven M. Bellovin" <[EMAIL PROTECTED]> writes: > > > Now, this does require that the CAs that your browser trusts follow > > > the Common Name=domain name convention, but that's just a special > > > case of trusting your CAs. > > > > The attacker co

Re: going around the crypto

1999-08-14 Thread MIKE SHAW
Right. But to do that you would most have to install your homemade CA root cert on their browser, which would probably tip off most users (at least a few customer would call clueless as to how to install a CA--I know ours would). The only CAs with commonly accepted root certs wouldn't let you ge

Re: going around the crypto

1999-08-14 Thread EKR
"Steven M. Bellovin" <[EMAIL PROTECTED]> writes: > > Now, this does require that the CAs that your browser trusts follow > > the Common Name=domain name convention, but that's just a special > > case of trusting your CAs. > > The attacker could also present a certficate from a fake CA with an >

Re: going around the crypto

1999-08-14 Thread EKR
"Steven M. Bellovin" <[EMAIL PROTECTED]> writes: > The L0pht has issued a new advisory for an routing-type attack that can, > they say, allow for man-in-the-middle attacks against SSL-protected sessions > (http://www.l0pht.com/advisories/rdp.txt). > > The implication -- that there's a flaw in SSL

Re: going around the crypto

1999-08-14 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, "MIKE SHAW" writes: > It's my understanding that in order to exploit this, you'd have to essentiall > y > set yourself up as a proxy after sending the RDP advert If this is the case, > > wouldn't the fact that the man in the middle did not have the cert that > co

Re: going around the crypto

1999-08-14 Thread MIKE SHAW
It's my understanding that in order to exploit this, you'd have to essentially set yourself up as a proxy after sending the RDP advert If this is the case, wouldn't the fact that the man in the middle did not have the cert that corresponded to the domain name cause at least one warning for most

going around the crypto

1999-08-13 Thread Steven M. Bellovin
The L0pht has issued a new advisory for an routing-type attack that can, they say, allow for man-in-the-middle attacks against SSL-protected sessions (http://www.l0pht.com/advisories/rdp.txt). The implication -- that there's a flaw in SSL -- is probably wrong. But they're dead-on right that the