[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] OpenSSL-Bug still allows MITM, Browser(s) set up badly - Re: Identify weak Debian OpenSSL clientsin SSH DH key exchange



> > That is indeed a problem. AFAIK IE 7 on Vista now does some CRL
> checking
> > by default, but I haven't tried it yet.
> 
> I did some research on this recently, and the story for browser support
> is actually much more complicated. In addition to CRLs there is a

It is even a bit more complicated - CRL checking can mean two different
things:
  1. check manually downloaded and installed CRLs, which is what Firefox
     1 and 2 will do if you install one. This is different from
  2. download CRLs automatically from the "CRL Distribution Point"
     (CDP), which may be contained in the certificate and check the CRL
     afterwards. Firefox 1 or 2 won't do this for you.

So for a typical user, this
>       * Firefox 1 and 2 support both OCSP and CRL, but default to
> using CRL. 

boils down to: they do not do any revocation checking.

Cheers,
  Alex
-- 
Dipl.-Math. Alexander Klink | IT-Security Engineer |    a.klink@xxxxxxxxx
 mobile: +49 (0)178 2121703 |          Cynops GmbH | http://www.cynops.de
----------------------------+----------------------+---------------------
      HRB 7833, Amtsgericht | USt-Id: DE 213094986 |     Geschäftsführer:
     Bad Homburg v. d. Höhe |                      |      Martin Bartosch

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/