SSL Still Mostly Misunderstood, Even By the Pros 292
An anonymous reader writes "People still don't understand SSL. This isn't much of a surprise... no one expects that grandma and grandpa know what SSL is and what it does. What is surprising and downright scary is that most IT professionals don't understand SSL, and many consider it to be the be-all, end-all of security in their organization. With all the tools out there to manipulate SSL connections, and the browser vendors unable to settle on a single method of showing if a site is secured by SSL or not, is it any wonder that no one gets it?"
You're doing it wrong (Score:5, Informative)
If you want to write a pretentious article about how people don't understand security of the interwebs, at least get the name right [wikipedia.org]. That's right, SSL hasn't been considered "secure" for at least a decade.
I liked netscape's method (Score:1, Informative)
"browser vendors unable to settle on a single method of showing if a site is secured by SSL or not"
They put a thin but obvious blue border around the entire browsing window. Why does Firefox not let you select among a few different methods? I know not.
Re:You're doing it wrong (Score:5, Informative)
If you want to write a pretentious response to a pretentious article, try reading the source you're linking to. SSL v2 hasn't been secure for a while, but SSL v3 is fine.
Re:You're doing it wrong (Score:1, Informative)
Whatever, everyone uses TLS and SSL interchangeably because they are for all intents and purposes the same. SSLv3 is secure but you do have the possibility of man-in-the-middle attacks. That is true of all public key based systems though (including SSH, etc).
Re:and WHY doesn't Slashdot use HTTPS? (Score:1, Informative)
Re:and WHY doesn't Slashdot use HTTPS? (Score:3, Informative)
caching.
You didn't get it right either... try "HTTPS" (Score:5, Informative)
The correct term is "HTTPS". HTTPS, which can use various versions of SSL or TLS, is still mostly understood. Even by the pros.
Re:and WHY doesn't Slashdot use HTTPS? (Score:5, Informative)
How would HTTPS help? You'll still probably do an unencrypted DNS lookup for idle.slashdot.org.
Re:and WHY doesn't Slashdot use HTTPS? (Score:2, Informative)
Not to mention the fact that the GETs will have to have their endpoint identifiers unencrypted, and so the IP addresses will be available, which means they'll know how MANY requests you've made to /.
Bug 215243 (Score:5, Informative)
By the way I use cacert to generate my certificates; it should be inlcuded in the default Firefox certification authorities list. I suspect there is money involved in getting into that list though.
CAcert failed a DRC audit. Bug 215243 comment 158 [mozilla.org] has the details.
Re:You're doing it wrong (Score:4, Informative)
> Even SSL was handicapped for years by the USA's insane 80-bit limit for SSL
> in exported software.
It was 40-bits. Agree with your point...just sayin'.
Re:As usual, no one wants to be the leader. (Score:4, Informative)
In general Java devs know ZIP about anything out side of a JAR file.
They may not even know that JAR files are ZIP format.
Re:SSL is trying to do too much. (Score:3, Informative)
All browsers would have each registrar's root CA certificates in their CA store. When a person registers a domain name, the registrar also gives them either an issuer certificate for that domain or a wild card certificate for that domain. The person could then either use the issuer certifcate to make more (www.example.com, store.example.com, etc.) or just use that wild card certificate (*.example.com).
Congratulations, you have just invented DNSSEC [dnssec.net].
Next task: Get root registrars to actually publish and issue root certificates to the registrars.
After that, get browsers to support them.
Re:You're doing it wrong (Score:2, Informative)
With a CA you set up, someone has to trust it explicitly by adding it as an exception, just as you have to do with individual certificates in your fud example.
ALL certificates are like this - modern OSs simply include and maintain a list of certificate authorities to trust.
Re:and WHY doesn't Slashdot use HTTPS? (Score:3, Informative)
You haven't yet been modded overrated for not understanding DNS, but maybe someone with mod points will stop by...
Before you exchange certificates you need the IP address of the other end. If Anonymous Coward doesn't want anyone to know that he reads the "idle" section then he needs to get the IP address of idle.slashdot.org without doing an unencrypted DNS lookup for it. How common is encrypted DNS?
PS You forgot to mention
c) get a MITM-attacked connection which your browser thinks is fine because it appears to be signed with MD5 by Thawte.
Re:and WHY doesn't Slashdot use HTTPS? (Score:3, Informative)
I know MD5 collisions wasn't my point - that's why I made that a PS - but you still haven't got what my point is. Ignoring insecurities in the PKI and TLS implementations, TLS can prevent eavesdroppers from knowing what data you're sending and receiving, but it can't prevent them from knowing with what server you're communicating. The eavesdropper can still sniff the IP address in the IP packets, and the DNS request which is necessary before you even send your SYN packet, which itself precedes certificate exchange. TLS is cryptography, not steganography.