[Security] TLS Certificates Verification (summary)
Johansson Olle E
oej at edvina.net
Wed Aug 20 07:14:00 CDT 2008
20 aug 2008 kl. 12.50 skrev Dave Cridland:
> On Wed Aug 20 11:24:54 2008, Johansson Olle E wrote:
>> 20 aug 2008 kl. 12.08 skrev Dave Cridland:
>>> On Wed Aug 20 07:37:32 2008, Johansson Olle E wrote:
>>>> 3) Clients may be behind NAT, so even a client-to-client direct
>>>> session may need help from a server (proxy). This will have to
>>>> be considered.
>>> This is a non-issue - we have Jingle, so we have the ability to
>>> negotiate various channels, at least one of which (IBB) will work
>>> through any amount of NATs and firewalling, albeit at a cost of
>>> efficiency and ugliness. Really, this whole debate about IBB vs
>>> NATs vs whatever is immaterial; we have Jingle specifically to
>>> solve all these problems, and it passes the buck to ICE-TCP et al
>>> to solve the tricky cases.
>> After spending many years with SIP and NAT traversal, I know that
>> we will still need NAT traversal proxys, ICE/STUN is just a
>> discovery service. And considering a possible future with IPv4 and
>> IPv6, there will be proxys there too. Any solution has to work
>> with an unknown or wellidentified point in the middle.
> For the record, I'm saying that we, here, don't need to care at all
> about NAT traversal because this problem is either solved, or else
> needs to be solved by Jingle and not by us and not here.
>
Well, if you want end to end TLS, there's some architecture examples
that will be affected by a middle man. Take the example of the OTR
"proxy" :-) I mentioned earlier. No one really
bother to check the OTR fingerprints, so they would not discover the
proxy, unless the client reacted the way my ssh client reacts to a new
key fingerprint.
You need to be aware of this when designing a solution. Requiring TLS
encryption of the stream after connection setup won't really be
affected as much as using the TLS connection certificate/keys, where a
middleman can
present a different set of keys.
/O
More information about the Security
mailing list