> SSL/TLS plus good authentication methods is immune to MITM attacks.[1] > > [1] Depending on everyone you trust being trustworthy. What if I'm > a verisign employee and can manage to generate a verisign-signed > cert for www.microsoft.com? I can MITM, and no alerts will occur > until/unless they figure out what happened and revoke my > certificate, which requires that CRL checking is available in > the client application you're using.
You can score a technical victory over this MITM attack just by saying that if you choose to trust a Verisign cert, Verisign is an intended recipient of the communication. A MITM is not permitted access to anything known only to intended recipients, and that would include Verisign's private key. However, most people don't like to think of Verisign as the intended recipient to all of their HTTPS communication. But technically, if you choose to trust Verisign certificates, you must either consider Verisign an intended recipient or you're technically vulnerable to a MITM attack where the MITM obtains a certificate with the intended server's name in it. How practical this attack is -- that's another story. Presumably, the reason you trust Verisign is because such an attack is highly impractical. DS ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]