how can you verify that the site you get is not a fake?

Joel Jaeggli joelja at darkwing.uoregon.edu
Mon Jun 6 05:06:55 UTC 2005


On Sun, 5 Jun 2005, bruce wrote:

> joel...
>
> as i understand the ssl process... the browser hits the ssl site.. the site
> returns some information to me, the browser. my question/statement, if i
> know what the information shoudl be from the server with the ssl cert, then
> why couldn't i somply craft a response on my server, and send the
> information back to the browser...

The part you missed is that your browser has a keyring full of ca's that 
it trusts. The cert that you recieve from a website is signed with the 
private key of a ca. one of the assertions of public key cryptography is 
that it's hard to recover the private key (two very large primes) from the 
public key (the product of the large primes) because factoring very large 
prime numbers is computationaly infeasable (This is an assertion you 
should check back on every couple years).

So in order to subvert this process (assuming I can't hack the crypto)I 
need to do one of four things, insert a new ca into your keyring, get you 
to accept a cert that isn't signed by a ca that you trust (this causes a 
warning message in your broswer), steal the cert installed on the 
webserver and use it in conjunction with some ip based trickery to 
masquerede as the site in question, or subvert the process (generally some 
kind of background check) by which a ca that you trust signs keys. The 
later is the most likey.

> feel free to try to tell me where the hole is in my question...
>
> -bruce
>
>
> -----Original Message-----
> From: Joel Jaeggli [mailto:joelja at darkwing.uoregon.edu]
> Sent: Sunday, June 05, 2005 9:34 PM
> To: bedouglas at earthlink.net; For users of Fedora Core releases
> Subject: RE: how can you verify that the site you get is not a fake?
>
>
> On Sun, 5 Jun 2005, bruce wrote:
>
>> ssl certs don't allow you, the user to know if you're at the right site!!
>> unless it's not possible to fake the information returned by the server to
>> the client. i suspect that the information stream is easily faked...
>
> ssl cert's are an assertion that the ca (cetrifcate authority) is
> asserting that the site you connecting to is who they say they are. if you
> trust the ca (who's public key is in your keyring) then you trust the
> sites that they vouch for. forging the ca's signature is infeasable.
> subverting the ca's procedures for signing a cert are in some cases not.
>
>> my question.. how do you know that paypal.com.. ia actually paypal.com
>> (paypal), and not a carefuly crafted fake!
>
> because you trust verisign. (maybe you trust them)
>
>> -bruce
>>
>>
>>
>> -----Original Message-----
>> From: fedora-list-bounces at redhat.com
>> [mailto:fedora-list-bounces at redhat.com]On Behalf Of Matthew Miller
>> Sent: Sunday, June 05, 2005 3:15 PM
>> To: For users of Fedora Core releases
>> Subject: Re: how can you verify that the site you get is not a fake?
>>
>>
>> On Sun, Jun 05, 2005 at 01:37:19PM -0700, bruce wrote:
>>> if i go to a site, how can i verify that the site that's displayed is
>> really
>>> the 'correct' site. is there a way to actually 'get' the ip address, and
>>> then to determine if that ip address actually matches up to the 'owner'
> of
>>> the site i'm looking at....
>>> any thoughts/ideas/etc...
>>
>> There's really not an absolutely good way to do this. The best we've got
> is
>> SSL server certificates.
>>
>> --
>> Matthew Miller           mattdm at mattdm.org        <http://www.mattdm.org/>
>> Boston University Linux      ------>                <http://linux.bu.edu/>
>> Current office temperature: 80 degrees Fahrenheit.
>>
>> --
>> fedora-list mailing list
>> fedora-list at redhat.com
>> To unsubscribe: http://www.redhat.com/mailman/listinfo/fedora-list
>>
>>
>
> --
> --------------------------------------------------------------------------
> Joel Jaeggli  	       Unix Consulting 	       joelja at darkwing.uoregon.edu
> GPG Key Fingerprint:     5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
>

-- 
--------------------------------------------------------------------------
Joel Jaeggli  	       Unix Consulting 	       joelja at darkwing.uoregon.edu
GPG Key Fingerprint:     5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2




More information about the fedora-list mailing list