Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-08 Thread Joe Btfsplk
On 9/7/2011 3:42 PM, Marsh Ray wrote: On 09/07/2011 03:19 PM, Julian Yon wrote: My bank forces me to enter part of my password using unobscured dropdowns for security. Sure, it avoids keyloggers, but what about *someone standing behind me*? Do they have a gun? Otherwise, cover the screen

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-08 Thread Julian Yon
On 08/09/11 15:20, Joe Btfsplk wrote: My point was ( I think Julian's) was, aside from certificate issues, various practices of many sites where security is vitally important, their WORDS ~ we take customers' security online safety very seriously use high security standards..., and their

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-03 Thread Joe Btfsplk
On 9/2/2011 4:46 PM, and...@torproject.org wrote: On Fri, Sep 02, 2011 at 01:31:53PM -0400, col...@averysmallbird.com wrote 4.5K bytes in 109 lines about: : According to a number of bloggers(1), torproject.org was include among those Here's another blogger for your list,

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-03 Thread Jim
Joe Btfsplk wrote: I'm just asking here - other than entities (gov'ts?) targeting anonymity software (for now) what prevents this issue from becoming widespread? If I download an update from MS - how do I know it's the authentic pkg from the real MS? There's no authentication (or even check

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-03 Thread Netizio
I'm just asking here - other than entities (gov'ts?) targeting anonymity software (for now) what prevents this issue from becoming widespread? If I download an update from MS - how do I know it's the authentic pkg from the real MS? There's no authentication (or even check sums) for d/l

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-03 Thread Julian Yon
On 03/09/11 15:59, Jim wrote: I don't have a solution to this problem but I am raising it in case somebody else does. It's great that you not only sign your packages but that the page above also lists the fingerprints of the signing keys. But in case of a man-in-the-middle attack (or a

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-03 Thread Lee
On 9/3/11, Joe Btfsplk joebtfs...@gmx.com wrote: [.. snip stuff addressed to others ..] Lee: These are all rhetorical questions - right? No. I understand Tor Project's main concern is Tor / TBB. I fail to understand why the issue / problem being discussed is in any way limited to Tor or a

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-02 Thread Achter Lieber
- Original Message - From: Roger Dingledine Sent: 09/01/11 03:47 PM To: tor-talk@lists.torproject.org Subject: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others) For those who haven't been following, check out https://blog.torproject.org/blog/diginotar-debacle

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-02 Thread Joe Btfsplk
On 9/2/2011 7:55 AM, Achter Lieber wrote: - Original Message - From: Roger Dingledine Sent: 09/01/11 03:47 PM To: tor-talk@lists.torproject.org Subject: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others) New bundles are out now: https://blog.torproject.org

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-02 Thread Joe Btfsplk
On 9/2/2011 9:57 AM, David Carlson wrote: On 9/2/2011 9:28 AM, Joe Btfsplk wrote: Is it really a risk, d/l Tor or TBB directly from Tor Project's site, that verifying signatures is necessary? What is the reasoning here - if getting files from Tor Project server?

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-02 Thread David Carlson
On 9/2/2011 9:28 AM, Joe Btfsplk wrote: On 9/2/2011 7:55 AM, Achter Lieber wrote: - Original Message - From: Roger Dingledine Sent: 09/01/11 03:47 PM To: tor-talk@lists.torproject.org Subject: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others) New bundles

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-02 Thread Seth David Schoen
Joe Btfsplk writes: Is it really a risk, d/l Tor or TBB directly from Tor Project's site, that verifying signatures is necessary? What is the reasoning here - if getting files from Tor Project server? How do you know it was really the Tor Project server? -- Seth Schoen sch...@eff.org

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-02 Thread Joe Btfsplk
On 9/2/2011 12:11 PM, Seth David Schoen wrote: Joe Btfsplk writes: Is it really a risk, d/l Tor or TBB directly from Tor Project's site, that verifying signatures is necessary? What is the reasoning here - if getting files from Tor Project server? How do you know it was really the Tor

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-02 Thread Collin Anderson
According to a number of bloggers(1), torproject.org was include among those domains targeted in the certificate breach. In at least the case of Google, these certificates have been offered to Iranian Internet users by a number of ISPs, in a number of city. Risk is a product of situation, and if

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-02 Thread andrew
On Fri, Sep 02, 2011 at 01:31:53PM -0400, col...@averysmallbird.com wrote 4.5K bytes in 109 lines about: : According to a number of bloggers(1), torproject.org was include among those Here's another blogger for your list,

[tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-01 Thread Roger Dingledine
For those who haven't been following, check out https://blog.torproject.org/blog/diginotar-debacle-and-what-you-should-do-about-it You should pay special attention if you're in an environment where your ISP (or your government!) might try a man-in-the-middle attack on your interactions with