▲ | tptacek 4 days ago | |||||||||||||||||||||||||
This thread is dignifying a debate that was decisively resolved over 15 years ago. MITM is a superset of the eavesdropper adversary and is the threat model TLS is designed to risk. It's worth pointing out that MITM is also the dominant practical threat on the Internet: you're far more likely to face a MITM attacker, even from a state-sponsored adversary, than you are a fiber tap. Obviously, TLS deals with both adversaries. But altering the security affordances of TLS to get a configuration of the protocol that only deals with the fiber tap is pretty silly. | ||||||||||||||||||||||||||
▲ | pyuser583 4 days ago | parent | next [-] | |||||||||||||||||||||||||
As someone who had to set up monitoring software for my kids, I can tell you MITM are very real. It’s how I know what my kids are up to. It’s possible because I installed a trusted cert in their browsers, and added it to the listening program in their router. Identity really is security. | ||||||||||||||||||||||||||
▲ | steventhedev 4 days ago | parent | prev [-] | |||||||||||||||||||||||||
TLS chose the threat model that includes MITM - there's no good reason that should ever change. All I'm arguing is that having a middle ground between http and https would prevent eavesdropping, and that investment elsewhere could have been used to mitigate the MITM attacks (to the benefit of all protocols, even those that don't offer confidentiality). Instead we got OpenSSL and the CA model with all it's warts. More importantly - this debate gets raised in every single HN post related to TLS or CAs. Answering with a "my threat model is better than yours" or somehow that my threat model is incorrect is even more silly than offering a configuration of TLS without authenticity. Maybe if we had invested more effort in 801.x and IPSec then we would get those same guarantees that TLS offers, but for all traffic and for free everywhere with no need for CA shenanigans or shortening lifetimes. Maybe in that alternative world we would be arguing that nonrepudiation is a valuable property or not. | ||||||||||||||||||||||||||
|