[security] [OpenID] Trust + Security @ OpenID
Johnathan Nightingale
johnath at mozilla.com
Fri Jul 20 13:30:39 UTC 2007
On 20-Jul-07, at 7:54 AM, Dmitry Shechtman wrote:
> The attack vector: I poison your local DNS resolver, or proxy all
> traffic, so that http://foo.blogspot.com actually resolves to
> http://evil.org's IP. If you follow the 302 redirect, you could be
> allowing evil.org to tell you what the "canonical" URL is. For
> example it could do a 302 redirect over to https://evil.org which
> presents a valid certificate and which can masquerade as the user's
> OP, capturing their password. (For users who check URLs, it could
> be https://my.open1d.org instead of https://evil.org.)
>
>
>
> Pardon my ignorance regarding TLS, but I don’t see what protection
> it would provide against such an attack. Is TLS similar to SSL with
> the exception of http prefix usage?
>
In most discussions (i.e. ones that don't concern themselves with
which version of SSL you're using) TLS and SSL are used as synonyms.
TLS (Transport Layer Security) is the name of an IETF standard based
on SSL v3.
As Dmitry observes, the protection it offers is useless if there are
http (i.e. non-SSL/TLS) links in the chain. In an environment where
the entire exchange happens over SSL/TLS though, the argument is that
DNS spoofing/redirect attacks won't work, because an attacker cannot
obtain a CA-signed certificate for a domain they don't own. Thus,
even when the spoofed DNS has redirected trusted-id.com to evil-evil-
hooray.com, attempts to verify the certificate of this false "trusted-
id.com" will fail, and presumably the connection will be killed.
Cheers,
Johnathan
---
Johnathan Nightingale
Human Shield
johnath at mozilla.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-security/attachments/20070720/94c4f577/attachment-0002.htm>
More information about the security
mailing list