From: William Ahern on
Mok-Kong Shen <mok-kong.shen(a)t-online.de> wrote:
> http://www.wired.com/threatlevel/2010/03/packet-forensics/

It's a shame that this is considered news. If telecom providers have few
qualms about letting the US government tap into their networks--I've been
told the Qwest CEO was just bluffing for more money--why should it come as a
surprise that certificate authorities are equally prone to acquiescence?
Like most other large, mature industries the private and public sectors
bleed into each other, with managers and executives moving back-and-forth
from private to government office all the time. At some point resistance to
government demands gave way, assuming there ever was such resistance.

This market for SSL COTS man-in-the-middle devices has been around for
awhile. I had briefly been on the periphery of these product discussions
more than 5 years ago. I wasn't surprised then, either, and never really
gave it much thought. I've always took it for granted that SSL gave only
limited protection, hindering only those without sufficiently deep pockets
and/or political authority.

What should be worrisome is that as this sort of activity becomes more
common it will become increasingly automated; that is, generation of
"forged" certificates. Much like POTS, it's just a matter of time before
these mechanisms are leverged by the so-called bad guys. The folks who
program these systems aren't particularly more adept at writing bug-free
software than others.

Hierarchical chains of trust were always a very limited idea. What's needed
are distributed certificate authorities and distributed trust metrics. But I
don't think the state-of-the-art is quite there, yet.

From: Maaartin on
On Mar 27, 8:54 pm, William Ahern <will...(a)wilbur.25thandClement.com>
wrote:
> Hierarchical chains of trust were always a very limited idea. What's needed
> are distributed certificate authorities and distributed trust metrics. But I
> don't think the state-of-the-art is quite there, yet.

I wonder if there're no protection against the certified-man-in-the-
middle attack at all. Obviously, anybody controlling your internet
access and owning the compelled certificate can pretend to be the
proper certificate owner. But the adversary has two choices:
1. connect to the proper certificate owner and forward (and possible
modify) the whole communication in both directions
2. simulate the behaviour of the proper certificate owner without
connecting to them

The second possibility is more demanding, e.g., in case of internet
banking the adversary had to create a web site looking exactly as
expected and showing all the past bank transactions, etc. This is
quite a lot of work which can't be easily automated (assuming the bank
does not co-operate, since than there'd no reason for the whole
attack). But if they manage to get it right, there's nothing what
could be done against the attack (as long as I trust the certificate),
right?

The first possibility can be easily automated, but I think there can
be some countermeasures, can't they?