BugTraq
International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 08 2005 04:39AM
Brandon Kovacs (liljoker771 gmail com) (2 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 09 2005 03:31PM
Will Kamishlian (will will-k com) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 10 2005 11:24AM
Peter J. Holzer (hjp wsr ac at) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 11 2005 07:07PM
Scott Gifford (sgifford suspectclass com) (2 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 11 2005 10:44PM
Neil W Rickert rickert+bt (at) cs.niu (dot) edu [email concealed] (rickert+bt cs niu edu) (2 replies)
RE: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 13 2005 12:32AM
David Schwartz (davids webmaster com) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 15 2005 08:12AM
Vincent Archer (var deny-all com) (2 replies)
RE: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 16 2005 11:48AM
David Schwartz (davids webmaster com) (2 replies)

> On Sat, Feb 12, 2005 at 04:32:26PM -0800, David Schwartz wrote:

> > > As a user of a browser I am not a customer of the CA, and it isn't
> > > evident why the CA should be under any obligation to me. They surely
> > > are under an obligation to their shareholders and their customers.

> > Nonsense. The CA is asking for your trust and can only earn
> > revenue based
> > upon the number of people who trust it.

> Wrong. The CA gains trust because it manages to get its
> certificate included
> with the default package for major browsers.

Correct. And the browser vendors gain trust because they only include
reputable CAs.

> It then has to persuade its customers (the server operators) to buy a
> certificate. It does not have to persuade any user: trust is already
> implied by the bundling.

How do you think you get the bundling?

To put it another way, what would happen if a CA violated the trust? If the
vendors didn't immediately ship patches to remove the untrustworthy CA,
there would be a great oppurtunity for third parties to do so, and rest
assured they would. Immediately.

This is no different than the case of Burger King buying inferior beef.
While it's true the beef vendor only has to convince Burger King to buy the
beef, not Burger King's customers, there wouldn't be any customers as soon
as they found out that Burger King was reselling food made from inferior
beef.

This is just like any other indirect relationship. Buyers never want poor
quality raw materials because they result in poor quality finished goods.

DS

[ reply ]
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 12 2005 04:03AM
Scott Gifford (sgifford suspectclass com) (1 replies)
Re: International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs. Feb 15 2005 07:00PM
bkfsec (bkfsec sdf lonestar org) (2 replies)


 

Privacy Statement
Copyright 2010, SecurityFocus