[security] DNS poisoning versus CA issues
Dan Lyke
danlyke at flutterby.com
Wed Oct 25 23:02:39 UTC 2006
At this point I've fairly well convinced myself that there's nothing
to be lost if anything in the OpenID process (except however the User
authenticates with the Identity Provider, but we've already mentioned
that that's not the purview of the OpenID spec) gets sniffed.
The issues are with DNS poisoning and MitM attacks.
So as I'm going through the scenarios in my head, I'm wondering a few
things:
1. How easy is it to get an illicit certificate? My impression is that
all it takes is an IP address (which, we've already seen in the DNS
poisoning attacks of March 2005, can be as simple as a compromised
Windows machine), a stolen credit card and a pay phone.
2. How easy is it to fool a CA? I remember the moment when it was
shown that Active X security was a joke because someone got a
certificate for a company that differed from the company people
expected by an ", Inc." or something similar, and I'm fairly sure I've
seen occurrences like this from the big net CAs.
And anyone who remembers Network Solutions in the '90s knows that
sometimes to do legitimate things with domain names we had to do them
through illegitimate paths.
3. Since the March 2005 attacks, are there any remaining known vectors
for DNS poisoning, especially in the context of real hosting and net
connection providers (ie: we can discount anyone running the Microsoft
name server) and the tightened rulesets for updates in the later
versions of BIND?
More information about the security
mailing list