> I do not believe there is an error in my logic.
> You are using the client's trust of the Proxy
> to bootstrap whether or not the client trusts
> the Host with whom it is attempting to communicate
> securely.

        If I put 'www.foo.com' in my browser, I want to make sure I reach the
server owned/operated by 'www.foo.com'. I'm willing to take whatever data
'www.foo.com' sends me as I have no control over where they get the data
they send me. That is the sole purpose of the certificate. 'www.foo.com' can
do anything at all. It can get data from other sources I don't trust, all
the certificate assures me is that whatever content I do see has been
blessed by 'www.foo.com'.

        The proxy does not change this. The proxy *is* 'www.foo.com'. The
certificate ensures me the data does come from 'www.foo.com'. I have on
control over where 'www.foo.com' gets its data from, that's 'www.foo.com's
job, or in this case, that's the proxy's job.

> If the Proxy server becomes compromised, the Proxy
> will continue to be trusted by the clients even
> though all of the data exchanged between the Client
> and the Host will now be visible to an attacker. Or
> worse the proxy can redirect to a host which is not
> even yours.

        *Any* host can do this. If 'www.amazon.com' becomes compromised, then
anyone can see the data I see when I punch in 'https://www.amazon.com' and
see a lock icon. All the certificate assures me is that 'www.amazon.com'
takes responsibility for my content.

> In my mind, the Client should not care one bit
> about the identity of the Proxy,

        That's like saying I shouldn't care whether a news story was in the Sun or
the New York Times. The proxy is the publisher. The publisher puts his
reputation on the story. My decision to trust the story is based upon the
credibility of the publisher, not the author. (An author can write stories
for both the Times and the Sun, I would expect their trustworthiness to
differ.)

> the Proxy should
> simply being acting as a packet forwarder through
> which the SSL/TLS session between the Client and
> the Host is negotiated.  Now what I see as your
> problem is that the Client (being a standard browser)
> is not going to trust the certificates which you
> are using for Host identification.

        You misunderstand. In this case, the servers are like authors, the proxies
are like publishers. The job of the proxy is to validate the author's
credentials.

> Assuming that the Proxy has not fallen into the wrong
> hands is like assuming you will never be attacked.  The
> point of security analysis of protocols is to determine
> where the weak points are and how those weak points
> could result in data compromise if they were to fail.

        Anything past the host is always beyond the scope of the authentication
scheme. The HTTPS protocol doesn't provide any assurance other than that the
content you see was 'blessed' by the host you entered in the URL. This
scheme preserves that assurance.

        DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to