[Ach] StartSSL for Business Sysadmins
pg at futureware.at
Wed Jan 15 15:58:48 CET 2014
> SSH can put up with click-thru syndrome because of its narrow domain.
> It works, because the user is the sysadm or knows the sysadm, and can
> ask when a click-thru is appropraite.
> SSL however cannot; it totally breaks the security model, and leaves
> wide open to the anticipated threat model -- MITM, aka phishing.
The problem we have here I think is HTTPS, not SSL.
https:// expects a secure connection to an authenticated server.
http:// does not expect any authentication from the server.
So we could easily use SSL opportunistically with anon-dh for http://
I guess that this might be what Google is (or could be) actually doing
with their SPDY protocol.
SPDY is used for http:// and https://, and every SPDY connection is
encrypted with TLS. So it effectively places a TLS underneath normal http://.
My guess is that they are using anon-dh for http:// and authenticated
ciphersuites for https:// then, but I couldn't read that out of the
documentation at the moment.
If anyone wants to research that question and could let me know about it...
If this is the case, then we should propose that that people should use
SPDY, so that they get opportunistic encryption for http://
More information about the Ach