> And this is precisely the crux of why I think this thread is a waste of 
> bandwidth.

Agreed.

I'll end, promising to shut up after this, with the following summary

        1) SSL/TLS has the capabilities to be immune to MITM attacks.

        2) These capabilities may be used in any number of ways, as
           determined by the needs of the system (unix domain sockets
           could rely soley on file permissions, and forgo any need
           for X509/etc) or the protocol specification (HTTPS
           requirement for trusted CAs and thus prevent an attack
           by requiring CN match.)

        3) Not using sufficent SSL/TLS capabilities in a secure way can
           leave SSL/TLS open to successful attacks.[1]

        4) Lots of companies/products probably do #3 above

        5) No matter who replies to this message, I promise to not
           respond to the list, and I hope not to respond off the
           list either.



[1] Yes, we all dissagree with the definition of 'MITM', which is why
    I just called this 'attacks'.


--
Brian Hatch                  "Look, somebody's got to have
   Systems and                some damn perspective around
   Security Engineer          here.  Boom, sooner or later.
http://www.ifokr.org/bri/     *BOOM*!"

Every message PGP signed

Attachment: pgp00000.pgp
Description: PGP signature

Reply via email to