From: Matti Nykyri <matti.nykyri@iki.fi>
To: "gentoo-user@lists.gentoo.org" <gentoo-user@lists.gentoo.org>
Subject: Re: [gentoo-user] Re: Heartbleed fix - question re: replacing self-signed certs with real ones
Date: Sun, 20 Apr 2014 12:21:08 +0300 [thread overview]
Message-ID: <2B56788B-6DD0-4874-8DA4-9EDB9EF68D6E@iki.fi> (raw)
In-Reply-To: <201404200949.46359.michaelkintzios@gmail.com>
On Apr 20, 2014, at 11:49, Mick <michaelkintzios@gmail.com> wrote:
> On Sunday 20 Apr 2014 01:18:43 Peter Humphrey wrote:
>> On Saturday 19 Apr 2014 18:43:50 Matti Nykyri wrote:
>>> Well you can use ssllabs.com. I use it for debuging. Here is what Bank of
>>> America uses:
>>>
>>> https://www.ssllabs.com/ssltest/analyze.html?d=www.bankofamerica.com&hide
>>> Res ults=on
>>
>> Well, that's an eye-opener and no mistake. I see my bank is rated B
>> overall. Could be worse I suppose. Maybe I should forward the results to
>> them.
>
> Many banks, businesses and public institutions have to cater for the lowest
> common denominator, or their help lines would be inundated with irate
> customers being asked to first reboot their MSWindows PC. Until the beginning
> of April 2014 this would have been a WinXP user with MSIE 8.0. In Europe up
> to 25% of all PCs are still on WinXP. This counts out anything exotic in
> encryption capabilities, like ECDHE and ECDSA, because it is only the latest
> versions of Firefox and Chrome that can use these.
Yes, this is true. Even gentoo doesn't have a stable firefox that supports TLSv1.2 highest security ciphers C030 and C02C (ECDHE-RSA/ECDSA-AES256-GMC-SHA384). But wht banks should do they should support the most secure ciphers and sort their ciphers lists so that the most secure are at the top. Because what I understood is that browsers will by default use the first cipher in the order the server sent them it supports and not go through the entire list.
A security aware user can ofcourse disable all the bad ciphers he foesn't want to use in his own browser. Now if he tries to connect to a poorly secured site the connection will fail until a common cipher is found. But what is important you will know when you try to make an insecure connection.
> This is the reason that banks also employ some other means of authentication,
> in addition to your user ID; e.g. they typically ask you to enter a few
> characters out of your password (different each time), or additional secret
> data like the name of your favourite teacher, mother's maiden name and the
> like.
>
> Unless someone was recording each and every login of yours with the bank and
> kept a record of each and every password character you ever typed they may
> still not be able to login, without locking up the account and triggering an
> offline replacement of your password.
NSA has this capability. Also i think most of the largest ISPs are capable to do it. All this requires is enough HD space, private key of any CA enabled x509 certificate and access to any router between you and the bank or DNS poisoning of your computer.
> So I suspect they assume that the Internet connection to their servers should
> be treated as <aheam!> less than private and have deployed additional means of
> at least stopping unauthorised transactions online.
--
-Matti
next prev parent reply other threads:[~2014-04-20 9:21 UTC|newest]
Thread overview: 42+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-04-16 10:52 [gentoo-user] Heartbleed fix - question re: replacing self-signed certs with real ones Tanstaafl
2014-04-16 11:14 ` Matti Nykyri
2014-04-16 17:56 ` Tanstaafl
2014-04-17 5:59 ` Matti Nykyri
2014-04-17 6:10 ` Mick
2014-04-17 14:40 ` Matti Nykyri
2014-04-17 15:49 ` Mick
2014-04-17 16:54 ` Joe User
2014-04-17 18:43 ` Matti Nykyri
2014-04-17 20:17 ` [gentoo-user] " walt
2014-04-18 5:50 ` Matti Nykyri
2014-04-18 14:27 ` Dale
2014-04-18 16:45 ` Mick
2014-04-18 18:08 ` Dale
2014-04-18 19:01 ` Mick
2014-04-18 20:27 ` Dale
2014-04-18 23:33 ` Mick
2014-04-19 15:29 ` Dale
2014-04-19 15:43 ` Matti Nykyri
2014-04-19 19:33 ` Dale
2014-04-19 19:43 ` Joe User
2014-04-19 21:23 ` Dale
2014-04-20 0:18 ` Peter Humphrey
2014-04-20 8:49 ` Mick
2014-04-20 9:21 ` Matti Nykyri [this message]
2014-04-20 10:26 ` Mick
2014-04-19 16:11 ` Mick
2014-04-19 18:41 ` Dale
2014-04-20 8:27 ` Mick
2014-04-20 9:10 ` Dale
2014-04-20 12:38 ` Mick
2014-04-20 16:40 ` Matti Nykyri
2014-04-20 17:20 ` Joe User
2014-04-21 6:57 ` Matti Nykyri
2014-04-20 18:36 ` Dale
2014-04-19 11:51 ` [gentoo-user] " Mick
2014-04-19 13:17 ` Joe User
2014-04-19 15:38 ` Matti Nykyri
2014-04-19 16:40 ` Joe User
2014-04-19 17:14 ` Mick
2014-04-20 23:20 ` Mick
2014-04-21 7:11 ` Matti Nykyri
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2B56788B-6DD0-4874-8DA4-9EDB9EF68D6E@iki.fi \
--to=matti.nykyri@iki.fi \
--cc=gentoo-user@lists.gentoo.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox