[16878] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A cool demo of how to spoof sites (also shows how TrustBar

daemon@ATHENA.MIT.EDU (Amir Herzberg)
Thu Feb 10 13:35:55 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 10 Feb 2005 09:59:15 +0200
From: Amir Herzberg <herzbea@macs.biu.ac.il>
To: "Steven M. Bellovin" <smb@cs.columbia.edu>
Cc: Ian Grigg <iang@systemics.com>, cryptography@metzdowd.com
In-Reply-To: <20050209191228.CCC333C024F@berkshire.machshav.com>

Steve, my point was not the trivial fact that TrustBar would not display 
the homograph; suppose it did... even then, the user is _asked_ about 
the certificate, since it was signed by an unusual CA that the user did 
not specify as `to be trusted always`; this should certainly be a good 
warning for most users (and of course, a good situation to check for 
tricks such as homographs...).

And even if some user allowed this CA as `always trusted`, there is 
still a fair chance he'll notice that the brand of CA on his bank's site 
has suddenly changed... which may also raise the alarm.

Best, Amir Herzberg


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post