Hi Patrick,

> As long as the bad guy doesn't compromise your private key, he
> won't be able to impersonate any of your hosts, wildcard cert or not.
What happens in the case of a web farm behind a proxy or load
balancer, where the forward facing host does SSL (perhaps through an
accelerator)?

Jeff

On Tue, Jun 8, 2010 at 6:55 AM, Eisenacher, Patrick
<patrick.eisenac...@bdr.de> wrote:
> Hi Jeff,
>
> thanks for responding, but see my comments below.
>
>> -----Original Message-----
>> From: Jeffrey Walton
>>
>> Hi Patrick,
>>
>> >> can you please elaborate on where you see a security drawback
>> >> in the attack scenario you mentioned when using wildcard
>> >> certs over non-wildcard certs?
>> Principle of leat privilege dictates that only a single server (or
>> possibly related servers) be "authenticated". However, a wild card
>> will match all hosts(some hand waiving here)  - even if the host was
>> put in place by a bad guy. I'm aware of a couple of tools that will
>> flag it. Exchange's Security Analyzer is one of them.
>
> As long as the bad guy doesn't compromise your private key, he won't be able 
> to impersonate any of your hosts, wildcard cert or not.
>
> Once he compromises your key, he further needs to hack your dns to redirect 
> traffic to his hosts.
>
> With a wildcard cert he can now add his hosts without interfering with the 
> service of yours. Without a wildcard cert he would need to do add some logic 
> to redirect traffic to your host whlie keeping others for himself. No big 
> deal.
>
> But once your host is hacked, I guess it's much easier to compromise your app 
> to his needs. No need to hack further into dns, to setup a server of his own 
> and jump through more hoops, while increasing the chance of being detected.
>
> So security-wise, I still can't see the major drawbacks you were talking 
> about earlier. I think wildcard certs are a valid option for securing your 
> hosts.
>
>> A related attack from Black Hat:
>> http://www.blackhat.com/presentations/bh-dc-09/Marlinspike/Bla
> ckHat-DC-09-Marlinspike-Defeating-SSL.pdf.
>
> But that presentation is talking about weaknesses in standard software and 
> the way people are using them. Whether I protect my site with a wildcard or 
> non-wildcard cert is of no relevance here.
>
>
> Patrick Eisenacher
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-us...@openssl.org
> Automated List Manager                           majord...@openssl.org
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to