lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20110910070537.GA6698@sivokote.iziade.m$> Date: Sat, 10 Sep 2011 10:05:37 +0300 From: Georgi Guninski <guninski@...inski.com> To: Dan Kaminsky <dan@...para.com> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Recent claims that windows update is broken On Fri, Sep 09, 2011 at 03:09:25PM -0700, Dan Kaminsky wrote: > On Thu, Sep 8, 2011 at 2:55 AM, Georgi Guninski <guninski@...inski.com>wrote: > > > http://www.theregister.co.uk/2011/09/07/diginotar_hacker_proof/ > > "I'm able to issue windows update," he [Comodohacker] wrote. "Microsoft's > > statement about Windows Update and that I can't issue such update is totally > > false!" > > > > The original Comodohacker statement is at: http://pastebin.com/85WV10EL > > > > Is this true? > > > > For the record, no. Windows Update doesn't just depend on WinVerifyTrust, > it also calls CertVerifyCertificateChainPolicy with > the CERT_CHAIN_POLICY_MICROSOFT_ROOT flag, documented here: > > http://msdn.microsoft.com/en-us/library/aa377163(v=vs.85).aspx > > > By your logic there would be no exploits just because the documentation writes so. I bothered to ask mainly for these reasons: 1. It is unclear to me what collection of private keys/certs Comodohacker has 2. From thereg article: >Microsoft declined to comment. -- georgi _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists