BugTraq
International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 08 2005 04:39AM
Brandon Kovacs (liljoker771 gmail com) (2 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 09 2005 03:31PM
Will Kamishlian (will will-k com) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 10 2005 11:24AM
Peter J. Holzer (hjp wsr ac at) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 11 2005 07:07PM
Scott Gifford (sgifford suspectclass com) (2 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 11 2005 10:44PM
Neil W Rickert rickert+bt (at) cs.niu (dot) edu [email concealed] (rickert+bt cs niu edu) (2 replies)
RE: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 13 2005 12:32AM
David Schwartz (davids webmaster com) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 15 2005 08:12AM
Vincent Archer (var deny-all com) (2 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 15 2005 08:44PM
Thor (Hammer of God) (thor hammerofgod com) (2 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 15 2005 09:24PM
bkfsec (bkfsec sdf lonestar org) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 15 2005 10:48PM
Thor (Hammer of God) (thor hammerofgod com) (2 replies)
>> Of course the CA has to gain the trust of the users... There are many
>> uses for client-based certificates: code signing, user verification,
>> email encryption, automatic mapping of user account to personal
>> certificates, blah blah blah. The business model of commercial CA's is
>> most certainly not limited to server operators only. While personal
>> certificate stores come with pre-trusted root certificates from many CA's
>> to automatically trust many server-based functions, there is a vast
>> market for client certs.
>>
> Yes, and how many average users do you know of who know this?
>
> I know quite a number of average users and know of absolutely 0 who would
> be aware of this.

The number of people that you know (or who I know) that are aware of the
uses for client
certificates is not what drives commercial certificate authority business
models. The simple fact of the matter is that user-level certificates are
an important part of the commercial certificate authority plan, and becoming
more and more so as your "average" users become aware of certificate
applications.

When I got my NIC handle untold years ago, only 561 other humans had one.
Your logic would preclude getting one in the first place, since no one knew
they existed at the time. When SSL certs were first being created
commercially, how many server operators did you know that had one? How many
do you know now? It's the same thing with client certs, and the logic
stands that certificate applications apply to them as well; particularly in
regard to the business and marketing models various certificate authorities
are running their business by. That was the point.

t

[ reply ]
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 12 2005 04:03AM
Scott Gifford (sgifford suspectclass com) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 15 2005 07:00PM
bkfsec (bkfsec sdf lonestar org) (2 replies)


 

Privacy Statement
Copyright 2010, SecurityFocus