[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Certificate proposal




[email protected] writes:
 > OK, but again, what about the man in the middle attack?  Suppose the
 > key that you found that claims to be from Bob is actually not his, but
 > another one created by a man in the middle, such as Bob's malicious
 > ISP?

You have several alternative means of verifying the key:

1) You can meet Bob at a local Pizza Hut and verify the key in person.

2) You can go through a variety of channels to a variety of other
trusted entities and verify with them that they're using the same key
for Bob.

3) You can set up some sorts of communications tests to "probe" for a
MITM situation, perhaps by passing through "seeded" information (data
taggants?).

 > I don't want to overstate the risk of this attack.  It would not be an
 > easy one to mount ... The risks of MITM attacks on public key
 > systems was recognized not long after those systems were proposed.  The
 > problems with fake keys have been discussed for over a decade.
 >
 > Why is this all suddenly irrelevant?  

I don't think it is irrelevant, I just think it's orthogonal to the
issue of whether a certificate for a key<-->entity relationship is
considered to be the key or an adjunct to the key.  I could be wrong,
of course.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
| Nobody's going to listen to you if you just | Mike McNally ([email protected]) |
| stand there and flap your arms like a fish. | Tivoli Systems, Austin TX    |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~