What damage could be done if a malicious certificate had an identical "Subject Key Identifier"?

I’m looking at the the Subject Key Identifier attribute of a CA certificate and am trying to understand the role it plays in validation and infer how validating client software could get it wrong.

What is the role of the Subject Key Iden… Continue reading What damage could be done if a malicious certificate had an identical "Subject Key Identifier"?

What are the risks of a rogue Access Point? What lessons can be learned from the Wifi Pineapple?

I’d like to educate colleagues and peers on rogue access points using the tool “Wifi Pineapple”.

What are some specific security-related lessons I could demonstrate? If applicable, what are the mitigations to those attacks?… Continue reading What are the risks of a rogue Access Point? What lessons can be learned from the Wifi Pineapple?

How does adding a random serial number improve a certificate’s security?

This article says:

“Finding collisions is a tricky process, since it requires you to muck
with the bits of the public key embedded in the certificate (see this
paper for more details). Also, Microsoft could have prevented this
so… Continue reading How does adding a random serial number improve a certificate’s security?

Inconsistencies found in OpenID Provider’s HTTP Headers. Which one is the most secure that I should imitate in my STS, and Relying Party?

I’m comparing the HTTP headers of the various providers (LiveID, Google, Yahoo, etc) and notice a broad inconsistency in implementation on the sign in page, sign out page, and subsequent pages.

What headers should I set/ignore, and what i… Continue reading Inconsistencies found in OpenID Provider’s HTTP Headers. Which one is the most secure that I should imitate in my STS, and Relying Party?