▲ | chowells 4 days ago | ||||||||||||||||||||||||||||||||||
Well, no. That's just not true. I care that when I type walmart.com, I'm actually talking to walmart.com. I don't look at the browser bar or symbols on it. I care what my bookmarks do, what URLs I grab from history do, what my open tabs do, and what happens when I type things in. Preventing local DNS servers from fucking with users is critical, as local DNS is the weakest link in a typical setup. They're often run by parties that must be treated as hostile - basically whenever you're on public wifi. Or hell, when I'm I'm using my own ISP's default configuration. I don't trust Comcast to not MitM my connection, given the opportunity. I trust technical controls to make their desire to do so irrelevant. Without the identity component, any DNS server provided by DHCP could be setting up a MitM attack against absolutely everything. With the identity component, they're restricted to DoS. That's a lot easier to detect, and gets a lot of very loud complaints. | |||||||||||||||||||||||||||||||||||
▲ | BrandoElFollito 4 days ago | parent [-] | ||||||||||||||||||||||||||||||||||
You use words that are alien to everyone. Well, there is a small incertainity in "everyone" and it is there where the people who actually understand DHCP, DoS, etc. live. This is a very, very small place. So no, nobody will ever look at a certificate. When I look at them, as a security professional, I usually need to rediscover where the fuck they moved the certs details again in the browser. | |||||||||||||||||||||||||||||||||||
|