Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes, and this is now a question if you can trust that the other person is not the adversary so we introduce trusted third parties and certificates.


One doesn't need to use trusted third parties to use public keys.

In fact, the most popular existing TTP public key infrastructure provides extremely limited security (someone who can intercept http near an IP where your domain name resolves can easily obtain an SSL cert with your domain name on it).


>someone who can intercept http near an IP where your domain name resolves can easily obtain an SSL cert with your domain name on it

Sorry to hijack this thread, can you please give me a keyword or link as to what this type of attack is called?

I have plans to host a domain, so wanted to know what this threat is called. Thanks!


I'm not sure what you'd call it other than man-in-the-middle.

The issue is that CA's (for various defensible reasons-- including that there isn't much better possible within their framework, it's not like they know you personally...) will issue a cert for your domain to any party that can throw a file up on it that their automation fetches via http.

In practice this means a MITM near your server (or, technically, anywhere between any CA that will issue certs for your domain and your server), or between your CA and the DNS results can get certs for your name and there isn't much you can do about it.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: