[Discuss] free SSL certs from the EFF

Matthew Gillen me at mattgillen.net
Fri Dec 5 09:43:20 EST 2014


On 12/04/2014 11:42 PM, John Abreau wrote:
> On Thu, Dec 4, 2014 at 1:00 PM, Richard Pieri <richard.pieri at gmail.com>
> wrote:
>
>> On 12/4/2014 12:15 PM, Joe Polcari wrote:
>>
>>> To me, that's a good reason for things to stop working.
>>>
>>
>> For certain values of "good" I suppose.
>>
>> Good news: your email wasn't hacked.
>> Bad news: you're fired for failing to submit your reports on time.
>
>
> On the other hand, if you accept the bad guy's poisoned DNS data:
>
>      Good news: you feel secure because you sent out your reports on time.
>      Bad news: They were sent to the bad guy's mail server, so you're still
> fired for failing to submit your reports on time to your employer's mail
> server.

Worse news: the DNS misdirection enabled a MITM attack that captured 
your credentials, and your credentials are used to hack into the company 
and cause a data breach. Then they have a real reason to fire you (has 
anyone actually been fired for not submitting reports on time?).  I know 
the example wasn't meant to be taken literally, but the point is that 
typically it is far worse to allow your credentials to be compromised 
than it is to have delays in doing your job.  Obviously the degree to 
which this is true varies from job to job, but the point remains that if 
you're ignoring authenticity with respect to what machines you are 
talking to, you can't be sure you are actually doing your job.

So that is why DoS should always be the preferred failure mode when 
authenticity can't be verified.

Matt



More information about the Discuss mailing list