[dns-operations] CERT VU#800113 Multiple DNS implementations vulnerable to cache poisoning
Otmar Lendl
ol at bofh.priv.at
Thu Jul 10 08:54:34 UTC 2008
On 2008/07/10 10:07, Sean Donelan <sean at donelan.com> wrote:
>
> Of course, whether the user ignores or disables the warnings is another
> matter.
>
I talked to the online-banking security guy of Austria's largest bank
and he's very pessimistic regarding end-2-end security as provided
by TLS / X.509 certs.
In his experience, users simply ignore those warnings.
It may be even worse: some of the X.509 CAs verify the validity of
a CSR by emailing the "Subject" of the Cert whether this is a valid
signing request. Now, if you manage to attack the DNS resolver of
their outgoing email server, then you can redirect that mail and
thus get a valid X.509 Cert in the Banks name.
/ol
--
-=- Otmar Lendl -- ol at bofh.priv.at -=-
More information about the dns-operations
mailing list