Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Posted Mar 25, 2015 15:33 UTC (Wed) by gerv (guest, #3376)In reply to: Google: Maintaining digital certificate security by cesarb
Parent article: Google: Maintaining digital certificate security
Gerv
Posted Mar 25, 2015 16:24 UTC (Wed)
by josh (subscriber, #17465)
[Link]
Posted Mar 25, 2015 21:05 UTC (Wed)
by cesarb (subscriber, #6266)
[Link] (1 responses)
That's not a strong argument.
First, if my home connection (or work connection) is persistently MITM'ed, and I always (or almost always) use it, it's likely that both the first visit and all subsequent visits to any site will be MITM'ed.
Second, let's take a real example: online banking. The first time I ever connect to it, I set up the online password by using the ATM password. The online banking website asks for the ATM password as an extra verification when doing important transactions. That is, the first time I connect to that online banking website is precisely when I need the most for it to NOT be MITM'ed.
Sure, HPKP can remove a lot of the risk in many situations (nomadic devices, MITM starting after you've already visited the site, etc), but there are several situations in which it doesn't help.
Posted Mar 25, 2015 21:34 UTC (Wed)
by dlang (guest, #313)
[Link]
There are a lot of cases where something like this does help, and if it can be coupled with something like the ssh key update things so that planned migrations from one key to another don't generate noise for users, there would be a lot of value in it.
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security