[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] How to pin the SSL certificate for torproject.org?
> >> Fetchmail, msmtp, etc can all connect to a host,
> >> take that cert fingerprint, compare it to the one you've
> >> configured, and drop the connection if they differ.
> > That may work against some adversaries but not against very clever adversaries.
> He can let the first connection alone and tamper with the other one.
> It is first assumed one securely obtains and verifies certs
> so you don't have this problem.
I am not talking about the bootstrap problem getting the fingerprint for the first time.
The adversary can let fetchmail, msmtp, etc through, return the correct fingerprint.
Afterwards the adversary recognizes the the second connection, which might be wget and use a compromised root CA certificate.
powered by Secure-Mail.biz - anonymous and secure e-mail accounts.
tor-talk mailing list