Electronics Home»Top Flaws in Distributed Authentication Systems and how they are Attacked, High Tech, Page 36

Top Flaws in Distributed Authentication Systems and how they are Attacked, High Tech, Page 36

Top Flaws in Distributed Authentication Systems and how they are Attacked

Share  Email
  Page: 36
See entire paper: http://electronics.wesrch.com/pdfEL11TZ3XNMONP
Page URL: http://electronics.wesrch.com/36-pdfEL11TZ3XNMONP
Note : Best viewed in FF3 or above, IE7 or above
Page(s): 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
 
Page content:

TLS has suffered some unfortunate issues in
the last years

 Null termination in certificate subjects
 No verification of CA basic constraints by
clients
 MD5 collision attacks
 Renegotiation
 Poor issuance policies by CAs
 Bad actor CAs
 Debian key generation flaws


Insert presenter logo
here on slide master.
See hidden slide 2 for
directions