BugTraq
International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 08 2005 04:39AM
Brandon Kovacs (liljoker771 gmail com) (2 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 09 2005 03:31PM
Will Kamishlian (will will-k com) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 10 2005 11:24AM
Peter J. Holzer (hjp wsr ac at) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 11 2005 07:07PM
Scott Gifford (sgifford suspectclass com) (2 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 11 2005 10:44PM
Neil W Rickert rickert+bt (at) cs.niu (dot) edu [email concealed] (rickert+bt cs niu edu) (2 replies)
RE: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 13 2005 12:32AM
David Schwartz (davids webmaster com) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 15 2005 08:12AM
Vincent Archer (var deny-all com) (2 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 15 2005 08:44PM
Thor (Hammer of God) (thor hammerofgod com) (2 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 15 2005 09:56PM
Sebastian (security-basics helsinki fi eu org) (1 replies)

A quick (and very non-scientific) thought: Do you have trust in the
issuer of your CC?
Do you trust a shop that has "Your major CC accepted" posted on the door?
Do you trust someone that can't provide the means to verify that trust,
with or without the sign?
Do you, as an average tourist, even know how you could check it?

I would think that the answer lies in one of those questions..

-Sebastian

Thor (Hammer of God) wrote:

>>> Nonsense. The CA is asking for your trust and can only earn revenue
>>> based
>>> upon the number of people who trust it.
>>
>>
>> Wrong. The CA gains trust because it manages to get its certificate
>> included
>> with the default package for major browsers.
>>
>> It then has to persuade its customers (the server operators) to buy a
>> certificate. It does not have to persuade any user: trust is already
>> implied by the bundling.
>
>
> Of course the CA has to gain the trust of the users... There are many
> uses for client-based certificates: code signing, user verification,
> email encryption, automatic mapping of user account to personal
> certificates, blah blah blah. The business model of commercial CA's
> is most certainly not limited to server operators only. While
> personal certificate stores come with pre-trusted root certificates
> from many CA's to automatically trust many server-based functions,
> there is a vast market for client certs.
>
> T

--
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.0.300 / Virus Database: 265.8.8 - Release Date: 14/02/2005

[ reply ]
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 12 2005 04:03AM
Scott Gifford (sgifford suspectclass com) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 15 2005 07:00PM
bkfsec (bkfsec sdf lonestar org) (2 replies)


 

Privacy Statement
Copyright 2010, SecurityFocus