Closed
Bug 1077323
Opened 10 years ago
Closed 3 years ago
Domain Authenticated Named Entities against MITM-attacks
Categories
(Core :: Security: PSM, defect)
Core
Security: PSM
Tracking
()
RESOLVED
WONTFIX
People
(Reporter: mozilla, Unassigned)
References
Details
(Keywords: sec-want)
Attachments
(1 file)
User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:32.0) Gecko/20100101 Firefox/32.0
Build ID: 20140924083558
Steps to reproduce:
Intelligence agencies and other criminals use TLS-certificates gained from CAs by trickery to run Man-In-The-Middle attacks against Firefox users which rely on TLS-encryption and -authorization.
Actual results:
MITM-Attack is successful if no other authentication mechanism is used than CAs. Certifcate pinning is only managable for a few well-used domains but not for the mass of existing domains.
Expected results:
Firefox uses "Domain Authenticated Named Entities" according to IETF RFC 6698 (http://tools.ietf.org/pdf/rfc6698) to validate the TLS-certificate. Two traffic-lights should show the states:
DNSSEC:
Green: DNSSEC-validation successful
Yellow: No DNSSEC-RRs for hostname
Red: Validation of DNSSEC-RRs failed
DANE:
Green: TLSA-validation successful
Yellow: No TLSA-RRs for hostname
Red: Validation of TLSA-RRs failed
In both "Red"-cases Firefox should refuse to load/display data and show an error message. DNSSEC-proxying with DO-/AD-bit is snake-oil as a MITM-attacker can suppress DNSSEC and forge plain DNS resource records. Do not use it!
Reporter | ||
Comment 1•10 years ago
|
||
Reporter | ||
Comment 2•10 years ago
|
||
Have a look at the Firefox-Addon "DNSSEC/TLSA Validator" (https://www.dnssec-validator.cz/) for implementation details.
Reporter | ||
Updated•10 years ago
|
Comment 3•6 years ago
|
||
Hello,
DANE support is still missing from Firefox. Since Firefox 57 any options to implement DANE support via extensions also eliminated.
I think Firefox can benefit from DANE implementation because sites with DANE-only certificates will attract additional auditory for Firefox browser (and vice versa).
This should be invisible to the user and show a security exception if DANE fails or block access if DANE fails with HSTS enabled.
DANE should be more trusted than a CA and enable use of self-signed certificates.
Comment 6•3 years ago
|
||
Currently we have no plans to support this.
Status: UNCONFIRMED → RESOLVED
Closed: 3 years ago
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•