On Fri, May 26, 2017 at 10:46:05AM +0530, Sankalp Bagaria wrote:
> 
> http://securityaffairs.co/wordpress/59238/cyber-crime/
> https-phishing-sites.html claims
> that phishing websites using HTTPS are increasing in number. If malicious
> sites can get certificates, it defeats the purpose of TLS. In my opinion,
> tougher measures are required to prevent malicious sites getting legitimate
> certificates. What can we do about it ?

As EKR said, this isn't within scope of TLS Working Group. And I don't
think it is even in the scope of the entiere IETF as whole (considering
the scope of work IETF does).

My opinion is that the problem isn't maliscous sites getting security
certificates (so what if paypal.com.foobar.za gets certificate saying
it is paypal.com.foobar.za? That is completely true claim). The issue
is the completely screwed up handling of security indications in
browsers. That is certainly not the sort of work the IETF is doing.


Judging by resonable interpretation of browser indications:

- Unencrypted http:// is safe (apart from passwords/CC numbers).
- DV certificates are extra trustworthy.

Neither of these interpretations is correct. But both are still
in my opinion reasonable.


TLS with DV certificates is not above expected security, it is the
closest to expected security, so it in my opinion should get the
neutral indicators (so no lock). And http:// certainly is much below
expected, so it should get negative indications. EV is above expected,
so it could get positive indications.


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to