[Cryptography] Questions about crypto that lay people want to understand
ianG
iang at iang.org
Fri Dec 25 11:44:15 EST 2015
On 21/12/2015 02:26 am, John Levine wrote:
>>> Your bank only accepts https because they have insurance that will
>>> reimburse them if their certificate gets spoofed.
>> I'm not aware of any such insurance. Given that the CA's consistently refuse to accept any
>> liability, ...
>
> Uh, what? Symantec says their warranty will pay up to $1.75M, although
> when one looks at the fine print, the breaches they cover seem pretty
> unlikely:
>
> https://www.symantec.com/en/in/page.jsp?id=compare-ssl-certificates
That's marketing. This is liability:
NEITHER PARTY WILL BE LIABLE UNDER ANY CIRCUMSTANCES WHATSOEVER FOR ANY
CONSEQUENTIAL, INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL OR EXEMPLARY
DAMAGES, INCLUDING WITHOUT LIMITATION LOST PROFITS OR REVENUES, WHETHER
FORESEEABLE OR UNFORESEEABLE, EVEN IF SUCH PARTY HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES.
http://www.symantec.com/content/en/us/about/media/repository/ssl-subscriber-agreement.pdf
> The usual approach in bank spoofing is to use a different domain that
> sort of looks like the target. It's hard to see how anyone could blame
> that on the bank's own CA.
It's hard to see, yes. How about: the CAs actively stop the browsers
from changing the security model to deal with any alternate model that
might prevent the spoofing, on the assumption that any better security
model won't sell as many certificates.
Showing that in court is a bit more work though :)
> I presume banks have general insurance
> against fraud losses but I don't know the details or how willing
> insurers are to cover these particular losses.
>
>> generally get away with it. These are not attacks on HTTPS - they usually "go around" the
>> encryption by planting virus on the end-user machines using spear-fished emails.
>
> Somewhat surprisingly, companies are gettting better at preventing
> malware attacks, I think through combinations of using a dedicated
> computer for bank transactions and two-factor dongles into which you
> put some part of the recipient's account number to generate a
> validation code. We can consider this a minor crypto success.
>
> The attack du jour is spear phishing a company's CFO or accounting
> clerk to send fake mail appearing to be from the boss telling them to
> wire money to the crook's account. Since the transaction is entered
> and validated correctly, banks are generally off the hook, although
> well run banks will notice atypical transactions and try to warn the
> company.
Which in theory is stopped by the security model - email that is signed
by the real boss looks different to the non-real boss. Problem is, it
doesn't work, in practice. Fundamental reason it doesn't work is
because the CAs can't figure out a way to get everyone to pay for
individual certs. And even if they can't figure it out, they're sure to
block any attempts to use another technology. Deadlock, users are screwed.
iang
More information about the cryptography
mailing list