[Ach] StartSSL for Business Sysadmins
Philipp Gühring
pg at futureware.at
Wed Jan 15 15:58:48 CET 2014
Hi,
> SSH can put up with click-thru syndrome because of its narrow domain.
> It works, because the user is the sysadm or knows the sysadm, and can
> ask when a click-thru is appropraite.
>
> SSL however cannot; it totally breaks the security model, and leaves
> wide open to the anticipated threat model -- MITM, aka phishing.
The problem we have here I think is HTTPS, not SSL.
https:// expects a secure connection to an authenticated server.
http:// does not expect any authentication from the server.
So we could easily use SSL opportunistically with anon-dh for http://
I guess that this might be what Google is (or could be) actually doing
with their SPDY protocol.
SPDY is used for http:// and https://, and every SPDY connection is
encrypted with TLS. So it effectively places a TLS underneath normal http://.
My guess is that they are using anon-dh for http:// and authenticated
ciphersuites for https:// then, but I couldn't read that out of the
documentation at the moment.
If anyone wants to research that question and could let me know about it...
http://en.wikipedia.org/wiki/SPDY
If this is the case, then we should propose that that people should use
SPDY, so that they get opportunistic encryption for http://
Best regards,
Philipp Gühring
More information about the Ach
mailing list