Re: GOST in OPENSSL_BASE

From: Andrey Chernov <ache_at_freebsd.org>
Date: Tue, 12 Jul 2016 13:54:21 +0300
On 12.07.2016 12:59, Daniel Kalchev wrote:
> The standard HTTPS implementation is already sufficiently broken, with the door wide open by the concept of “multiple CAs”. The protocol design is flawed, as any CA can issue certificate for any site. Applications are required to trust that certificates, as long as they trust the CA that issued them.
> 
> It is trivial to play MTIM with this protocol and in fact, there are commercially available “solutions” for “securing one’s corporate network” that doe exactly that. Some believe this is with the knowledge and approval of the corporation, but who is to say what the black box actually does and whose interests it serves?
> 
> There is of course an update to the protocol, DANE, that just shuts this door off. But… it faces heavy resistance, as it’s acceptance would mean the end of the lucrative CA business and the ability to intercept “secure” HTTPS communication. Those relying on the HPPTS flaws will never let it become wide spread.
> 
> In summary — anyone can sniff HTTPS traffic. No need for any cipher backdoors here. Nor any need for GOST to be involved.

You forget to mention that CA must already be in the trusted root list
to allow it happens.




Received on Tue Jul 12 2016 - 08:54:26 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:41:06 UTC