Fwd: Defending against malicious SSL proxy

2013-10-11 Thread Igor Bukanov
-- Forwarded message -- From: Igor Bukanov Date: 11 October 2013 15:02 Subject: Re: Defending against malicious SSL proxy To: Brian Smith >From a practical point of view anything that requires changes in the existing SSL infrastructure cannot be deployed quickly. Moreo

Re: Defending against malicious SSL proxy

2013-10-01 Thread Igor Bukanov
> I don't know the details of J-Pake etc., This is a type of protocols that allows *mutual* authentication using simple passwords or other shared secrets without leaking any information about the passwords (so dictionary attacks on the captured traffic etc does not work). As a result of the authe

Re: Defending against malicious SSL proxy

2013-10-01 Thread Igor Bukanov
> Why is this attack not thwarted by the use of external secure keys? Currently the bank uses a password and a hardware token. Changing that is a long process and using JS-based RSA is considered a temporary measure to raise the bar for attackers. > That's what my bank has issued me. The one-time

Re: Defending against malicious SSL proxy

2013-09-30 Thread Igor Bukanov
e: > On 30/09/13 20:35 PM, Igor Bukanov wrote: > ... > >> A real experience shows that a substantial number of those fraud >> attempts comes from computers where malware installs own root >> certificate and then install either real or transparent proxy. The >> access

Defending against malicious SSL proxy

2013-09-30 Thread Igor Bukanov
On the current web it is a matter of fact that a banking site should be developed under assumption that a substantial number of users use infected computers with some of them would attempt to perform a banking fraud. A real experience shows that a substantial number of those fraud attempts comes f