On 20-Jul-07, at 7:54 AM, Dmitry Shechtman wrote:

The attack vector: I poison your local DNS resolver, or proxy all traffic, so that http://foo.blogspot.com actually resolves to http://evil.org's IP. If you follow the 302 redirect, you could be allowing evil.org to tell you what the "canonical" URL is. For example it could do a 302 redirect over to https://evil.org which presents a valid certificate and which can masquerade as the user's OP, capturing their password. (For users who check URLs, it could be https://my.open1d.org instead of https://evil.org.)



Pardon my ignorance regarding TLS, but I don’t see what protection it would provide against such an attack. Is TLS similar to SSL with the exception of http prefix usage?

In most discussions (i.e. ones that don't concern themselves with which version of SSL you're using) TLS and SSL are used as synonyms. TLS (Transport Layer Security) is the name of an IETF standard based on SSL v3.

As Dmitry observes, the protection it offers is useless if there are http (i.e. non-SSL/TLS) links in the chain. In an environment where the entire exchange happens over SSL/TLS though, the argument is that DNS spoofing/redirect attacks won't work, because an attacker cannot obtain a CA-signed certificate for a domain they don't own. Thus, even when the spoofed DNS has redirected trusted-id.com to evil-evil- hooray.com, attempts to verify the certificate of this false "trusted- id.com" will fail, and presumably the connection will be killed.

Cheers,

Johnathan

---
Johnathan Nightingale
Human Shield
[EMAIL PROTECTED]



_______________________________________________
security mailing list
[email protected]
http://openid.net/mailman/listinfo/security

Reply via email to