LWN: Comments on "SSL man-in-the-middle attacks" https://lwn.net/Articles/312777/ This is a special feed containing comments posted to the individual LWN article titled "SSL man-in-the-middle attacks". en-us Sun, 14 Sep 2025 16:07:01 +0000 Sun, 14 Sep 2025 16:07:01 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net please move this stuff into DNS https://lwn.net/Articles/313118/ https://lwn.net/Articles/313118/ jamesh <div class="FormattedComment"> I am sure that you are smart enough not to enable VerifyHostKeyDNS option in ssh for any machine that uses an untrusted DNS resolver. But surely you understand why the option is disabled by default, right?<br> <p> Until we get to the point where people get a secure DNS resolver installed by default, it doesn't make sense for application developers to trust the DNS response by default. Relying on a pre-shared public key gives the application much better assurance (even if this assurance is weaker than what they'd get from a properly verified DNSSEC response).<br> <p> Perhaps if an operating system installed a DNS resolver that performed the necessary checks by default, it would make sense for applications to trust the response flags. But until that point, applications are better off using some other trust mechanism.<br> </div> Wed, 31 Dec 2008 05:37:16 +0000 please move this stuff into DNS https://lwn.net/Articles/313090/ https://lwn.net/Articles/313090/ tialaramex <div class="FormattedComment"> You could provide such a DNS server, but you can't force me to trust it.<br> <p> On a laptop I can choose to run a local DNS server, which implements DNSSEC and (as soon as the root is signed) get a complete end-to-end chain. Perhaps you don't know anybody who does this today, and perhaps in five years you won't know anybody who doesn't.<br> <p> On a moderately secure wired LAN (or suitably protected wireless one) I can provide a local DNS server and sacrifice the last hop security for improved performance from the shared cache.<br> <p> What's much nicer about using DNSSEC for this is then all I'm relying on is the immediately evident hierarchy, thus...<br> <p> physics.soton.ac.uk relies on the root, then the UK government and its DNS operator Nominet, the JaNET (UK academic network) management &amp; operator, and the University (of Southampton)'s management and systems team. This makes sense - it's almost the same hierarchy that issued the machine with an IP address.<br> <p> Whereas with current CA-based SSL physics.soton.ac.uk may well rely on the integrity of a cheap reseller from Taiwan, who acts as a front for an outfit in California, which in fact subcontracts the technical work to a small business in Finland run by a 14 year old girl. But I can't tell any of that, all I get is a picture of a padlock.<br> <p> DNSSEC can be leveraged to deliver secure-by-default to the web, something which I think would be more revolutionary than most people realise.<br> </div> Tue, 30 Dec 2008 14:40:34 +0000 CAcert vs. commercial CAs https://lwn.net/Articles/313082/ https://lwn.net/Articles/313082/ angdraug <p>I think most important observation in this story is that CAcert.org, the free CA which Mozilla refuses to support in their browsers, implements a better vetting process than many of those commercial CAs supported by Mozilla since days of yore.</p> <p>Not that I'm surprised with the commercial CAs (I strongly suspect that Comodo wouldn't be the only one with a flakey process): their primary purpose is making money, so the choice between charging you for another certificate and turning you down by the means of a strong vetting process is really a no-brainer. What doesn't stop to amaze me is that Mozilla, supposedly free and security-conscious project, continually refuses to support a fellow free security-focused project. Kind of proves my theory that money is bad for free software.</p> Tue, 30 Dec 2008 12:29:53 +0000 SSL man-in-the-middle attacks https://lwn.net/Articles/313068/ https://lwn.net/Articles/313068/ jwb <div class="FormattedComment"> Mozilla.org has a lengthy explanation on their web site about how a root cert is allowed into the distribution. I assume that now that it has been proven that this vendor does not meet the standards of the Mozilla.org policy, their key will be removed from the distribution in the next update.<br> </div> Tue, 30 Dec 2008 04:52:48 +0000 SSL man-in-the-middle attacks and trust https://lwn.net/Articles/313036/ https://lwn.net/Articles/313036/ clugstj <div class="FormattedComment"> "but it does suffer from a major shortcoming: key exchange"<br> <p> I can't think of a system that wouldn't suffer from this "shortcoming". Any system like this requires that someone/thing be "trusted".<br> </div> Mon, 29 Dec 2008 21:28:47 +0000 SSL man-in-the-middle attacks https://lwn.net/Articles/312985/ https://lwn.net/Articles/312985/ TRS-80 <blockquote>What no browser implemnts, AFAIK, is autoamgic display of who the a valid certificate authenticates. I could register a domain name and get an SSL certificate. Only those suspicious enough to check the certificate would notice the authenticated domain was not what the HTML indicated.</blockquote> Extended Validation (<a href="http://en.wikipedia.org/wiki/Extended_Validation_Certificate">EV</a>) certificates are supposed to solve this - the browser displays the registered company name in the UI (<a href="http://www.westpac.com.au/internet/publish.nsf/Content/WISE+Extended+Validation+SSL+Certificates">examples in IE, FF and Safari</a>). Mon, 29 Dec 2008 10:13:40 +0000 please move this stuff into DNS https://lwn.net/Articles/312963/ https://lwn.net/Articles/312963/ jamesh <div class="FormattedComment"> Unless I am mistaken, that code is only testing that the DNS server OpenSSH uses thinks that the DNS record is secure. It doesn't actually do any verification itself (following the signature chain all the way back to the DNS root).<br> <p> If I set up a public wifi network, I could easily provide a DNS server that said every record was secure and use DHCP options to get machines that connect to use that server. How would OpenSSH be able to tell the difference between this network and a secure network where the responses from the DNS server can be trusted?<br> <p> So there seem to be real problems with applications trusting DNSSEC results given the types of networks people connect to these days ...<br> </div> Sun, 28 Dec 2008 23:40:43 +0000 SSL man-in-the-middle attacks https://lwn.net/Articles/312934/ https://lwn.net/Articles/312934/ james-mathiesen <div class="FormattedComment"> Thanks for checking. I was hoping I had missed something. :(<br> <p> </div> Sun, 28 Dec 2008 02:00:21 +0000 SSL man-in-the-middle attacks https://lwn.net/Articles/312924/ https://lwn.net/Articles/312924/ hmh <div class="FormattedComment"> Never mind. This is incorrect. Yes, you disclose information, OCSP wants to be lightweight, so you tell the server just the certificates you're interested in.<br> <p> That teaches me to re-check my facts before posting...<br> </div> Sat, 27 Dec 2008 19:35:25 +0000 SSL man-in-the-middle attacks https://lwn.net/Articles/312917/ https://lwn.net/Articles/312917/ hmh <div class="FormattedComment"> It depends.<br> <p> The entire revocation list is downloaded and stored for further reference.<br> <p> The URL to the revocation list is not in the certificate, but in the issuer certificate from the CA, so the information leak is very limited on a normal certificate from a normal CA.<br> </div> Sat, 27 Dec 2008 17:45:57 +0000 SSL man-in-the-middle attacks https://lwn.net/Articles/312883/ https://lwn.net/Articles/312883/ james-mathiesen <div class="FormattedComment"> hmm... does the revocation protocol leak a lot of information about online activities to 3rd parties? ip address 1.2.3.4 apparently banks at xxx, shops at amazon, etc... <br> </div> Fri, 26 Dec 2008 22:25:17 +0000 SSL man-in-the-middle attacks https://lwn.net/Articles/312865/ https://lwn.net/Articles/312865/ dps <div class="FormattedComment"> What no browser implemnts, AFAIK, is autoamgic display of who the a valid certificate authenticates. I could register a domain name and get an SSL certificate. Only those suspicious enough to check the certificate would notice the authenticated domain was not what the HTML indicated.<br> <p> Maybe we need a separate list of bad certificates, not controlled by any CA, that browsers could check. An online "sting" site might be a good idea too.<br> <p> Just in case anyone is wondering {phish,phishing}.{org,com,co.uk,org,uk} are all registered already. I am not associated with any of those sites.<br> <p> </div> Fri, 26 Dec 2008 17:17:21 +0000 Security problems with CAs https://lwn.net/Articles/312859/ https://lwn.net/Articles/312859/ vonbrand <p> Sad fact is that really checking is <em>expensive</em>, and CAs aren't in the business of "wasting" money to then turn a paying customer away... plus certificates are the same whether they are meant to protect (probably not very interesting) email from prying eyes, commercial transactions in the range of a few tens of dollars, or multi-million dollar movements. The association of the "personal" certificate with all sorts of identifying data makes the planned use of those a privacy nightmare. The whole concept is deeply flawed. For an in-depth discussion of the current issues, look at <a href="http://www.cs.auckland.ac.nz/~pgut001/pubs/pkitutorial.pdf">Peter Gutmann's PKI tutorial</a> (a large PDF presentation). Fri, 26 Dec 2008 13:21:46 +0000 please move this stuff into DNS https://lwn.net/Articles/312847/ https://lwn.net/Articles/312847/ weasel <i>I think the problem with putting the cert fingerprint into DNS is the application doesn't know if the response was secured by DNSSEC or not. </i> <p> Unfortunately the article you link to only states the same fact as you, and does not even try to give an explanation, reason or argument. <p> At least ssh appears to be able to figure out if information it gets from DNS is secure or not. It does that by checking the AD bit in the dns response (see dns.c in its source and the VerifyHostKeDNS entry in the ssh_config manpage). Fri, 26 Dec 2008 08:27:13 +0000 please move this stuff into DNS https://lwn.net/Articles/312843/ https://lwn.net/Articles/312843/ TRS-80 The point isn't how easy/lazy it is, the point is to avoiding have to trust (now apparently) untrustworthy CAs. Maintaining your own CA (is that what you mean by signing certificate?) might be OK if you're the only user, but asking other people to install your CA is a right pain, and then you have to worry about keeping the CA secure, plus all the regular PKIX hassles of updating certs etc. Fri, 26 Dec 2008 03:36:13 +0000 please move this stuff into DNS https://lwn.net/Articles/312842/ https://lwn.net/Articles/312842/ drag <div class="FormattedComment"> You know that creating your own signing certificate is not significantly more difficult then making a self-signed... I mean I started off with self-signed for mucking around with doing things, but figured that since I am worrying about encryption anyways I might as well do it myself.<br> <p> It just strikes me as a bit lazy. Not a lot lazy as the SSL/TLS stuff is difficult to get right. But for as long as this stuff has been out it should be fairly simple to do.<br> </div> Fri, 26 Dec 2008 03:18:03 +0000 please move this stuff into DNS https://lwn.net/Articles/312841/ https://lwn.net/Articles/312841/ TRS-80 Well, it's not just applicable to HTTP - you can use it for IMAP and SMTP authentication too. How many people use a self-signed cert for those, and are going to be bitten when Thunderbird 3 comes out with the same anti-self-signed UI as Firefox? <p> Anyway, for web designers HTML 5 <a href="http://blog.whatwg.org/this-week-in-html-5-episode-15">offers a way to have HTML login forms</a> for HTTP auth. Fri, 26 Dec 2008 02:23:16 +0000 please move this stuff into DNS https://lwn.net/Articles/312830/ https://lwn.net/Articles/312830/ quotemstr <div class="FormattedComment"> Er, if I'm reading this right, it's just an HTTP-authentication-style password exchange system, built out of TLS primitives.<br> <p> For vain reasons, it'll never be used: web designers like being able to specify how their login boxes look.<br> </div> Thu, 25 Dec 2008 20:15:02 +0000 SSL man-in-the-middle attacks https://lwn.net/Articles/312816/ https://lwn.net/Articles/312816/ jake <div class="FormattedComment"> <font class="QuotedText">&gt; Surely the acronym should read OCSP rather than OSCP?</font><br> <p> Gah! Indeed, fixed now, thanks ...<br> <p> jake<br> </div> Thu, 25 Dec 2008 15:22:12 +0000 please move this stuff into DNS https://lwn.net/Articles/312808/ https://lwn.net/Articles/312808/ TRS-80 I think the problem with putting the cert fingerprint into DNS is the application <a href="http://groups.google.com/group/mozilla.dev.tech.crypto/msg/026a7bdad8b60c8b">doesn't know if the response was secured by DNSSEC or not</a>. <p> To get rid of CAs for basic cert uses, which is protecting passwords from being sent in the clear, Mozilla should be implementing and advocating <a href="http://tools.ietf.org/html/rfc5054">RFC 5054, TLS/SRP</a>, however NSS (a Mozilla subproject) <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=356855">won't add it until Mozilla does the UI work</a>, but Mozilla <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=405155">wants to do the UI work as extensions, so needs NSS done first</a>. Thu, 25 Dec 2008 14:11:54 +0000 please move this stuff into DNS https://lwn.net/Articles/312807/ https://lwn.net/Articles/312807/ weasel <div class="FormattedComment"> Clearly we need to get rid of CAs at least for the most basic certificate uses - they might be useful with the Extended Validation thing again, I don't know.<br> <p> Once we have DNSSEC (it'll be there RSN, with the Hurd and DNF supporting it out of the box) we should just put the cert (fingerprint) into DNS and be done with it.<br> </div> Thu, 25 Dec 2008 13:30:24 +0000 SSL man-in-the-middle attacks https://lwn.net/Articles/312806/ https://lwn.net/Articles/312806/ jamesh <div class="FormattedComment"> Surely the acronym should read OCSP rather than OSCP?<br> </div> Thu, 25 Dec 2008 13:10:28 +0000