[security] more timing
Dan Lyke
danlyke at flutterby.com
Fri Oct 27 17:20:23 UTC 2006
On Fri, 27 Oct 2006 09:45:59 -0700, Alaric Dailey wrote:
> Yet another argument for encrypting EVERYTHING between the end
> points, as well as using something verifiable for keys, rather
> than just something self-signed like PGP or SSH.
While I agree that protocols should be implemented such that
eavesdropping isn't a concern, I've got two particular issues here:
As I've mentioned before, "something verifiable for keys" simply means
"we trust the Certificate Authority". I ran that phrase past some of
my friends who've run network services for over a decade in various
different forms (I started an ISP with one of 'em back in '93, before
I left networking for computer graphics), and after they stopped
rolling on the floor laughing they said that they're of the opinion
that DNS spoofing in the latest version of BIND is way way harder than
social engineering a CA.
And since I've been involved in getting a (legitimate) certificate
recently, I tend to agree.
Second, the specific example here involves a compromised machine and a
rather clumsy attempt at cracking further services. Encrypting what
happens between that computer and others in those circumstances is
like locking a screen door.
Dan
More information about the security
mailing list