Re: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-18 Thread Greg Broiles

At 09:53 AM 7/11/2002 +0200, Stefan Kelm wrote:
 
  See http://www.securityspace.com/s_survey/sdata/200206/certca.html for
  recent data re SSL certificate market share; Geotrust, at

I sincerely doubt the numbers presented in this so-called
survey. How did they get to a number of only 91,136
secure servers across all domains? There are a huge number
of CAs, many of which offer certificates to the public
(see http://www.pki-page.info/#CA). Even if most CAs will
not have a significant market share those numbers would be
different.

For another data point, see this Netcraft survey circa January 2001 -

http://www.netcraft.com/surveys/analysis/https/2001/Jan/CMatch/certs.html

.. it shows approx 108,000 secure servers (they don't total it, and I didn't
bother adding up all the CA's with 10 certs in use.)

Security Space's numbers for the same timeframe show that they found 58,117
servers - http://www.securityspace.com/s_survey/sdata/200012/certca.html.

I don't know if the difference means that, between Jan 2001 and Jun 2002,
Security Space has discovered the other 40,000 secure servers in use; or
if they always see a fraction of what Netcraft does. (Netcraft's current data
is available for a yearly subscription at 1200 UKP.)

What I find especially telling in the recent Security Space results is the 
breakdown by validity -

Valid: 17833
Self-signed: 5275
Unknown signer: 13348
Cert-host mismatch: 32536
Expired: 35071

.. so, less than 20% of the certificates that they find on SSL servers in 
use on the open Internet are functioning correctly as part of a PKI; even 
if we assume that every one of the self-signed and
unknown signer certs servers are participating in undocumented or private 
PKIs such that their details are
unavailable to surveys like this one, that's still only 40% of the visible 
SSL servers. The remaining 60% are apparently misconfigured or forgotten.


--
Greg Broiles -- [EMAIL PROTECTED] -- PGP 0x26E4488c or 0x94245961



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



RE: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-15 Thread Lucky Green

Enzo wrote quoting Lucky:
  The cert shows as being issued by Equifax because Geotrust 
 purchased 
  Equifax's root embedded in major browsers since MSIE 5 on the 
  secondary market. (Geotrust purchased more than just the root).
 
 This raises an interesting legal issue. Should any loss from 
 a mis-issued cert arise to a party who trusted the Equifax 
 brand name shown in the cert chain, but doesn't know (or want 
 to know) anything about Geotrust, who would be liable?
 
 (Yeah, I know, any liability is usually disclaimed away, but 
 I mean: which one of the two is supposed to represent the 
 trusted thirt party?)

I suspect that until there is more case law related to digital
certificates, this question will be very challenging to answer.

--Lucky


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



RE: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-14 Thread Lucky Green

RJ Harvey wrote:
 Thanks for the tip!  I just got a new cert from Geotrust,
 and it was such an amazing contrast to those I've gotten
 from Verisign and Thawte!  They apparently take the 
 verification info from the whois data on the site, and you 
 really can do the process from start to finish in 10 minutes or so.

I believe that Geotrust has come up with an excellent new model to make
money out of the CA business with minimum hassle to the customer while
reducing Geotrust's vetting costs down to next to zero. Their
introduction of this new model was one of the more interesting news at
this year's otherwise rather bland RSA Conference.

 The cert shows that it's issued by Equifax, however.

The cert shows as being issued by Equifax because Geotrust purchased
Equifax's root embedded in major browsers since MSIE 5 on the secondary
market. (Geotrust purchased more than just the root).

--Lucky Green


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-14 Thread Enzo Michelangeli

- Original Message -
From: Lucky Green [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Sunday, July 14, 2002 11:55 AM
Subject: RE: IP: SSL Certificate Monopoly Bears Financial Fruit


  The cert shows that it's issued by Equifax, however.

 The cert shows as being issued by Equifax because Geotrust purchased
 Equifax's root embedded in major browsers since MSIE 5 on the secondary
 market. (Geotrust purchased more than just the root).

This raises an interesting legal issue. Should any loss from a mis-issued
cert arise to a party who trusted the Equifax brand name shown in the cert
chain, but doesn't know (or want to know) anything about Geotrust, who would
be liable?

(Yeah, I know, any liability is usually disclaimed away, but I mean: which
one of the two is supposed to represent the trusted thirt party?)

Enzo



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-12 Thread Peter Gutmann

[EMAIL PROTECTED] writes:
On 6 Jul 2002 at 9:33, R. A. Hettinga wrote:
Thawte has now announced a round of major price increases.  New
cert prices appear to have almost doubled, and renewals have
increased more than 50%. While Thawte proclaims this is their
first price increase in five years, this comes at a time when we
should be seeing *increased* competition and *lower* prices for
such virtual products, not such price increases.  But of course,
in an effective monopoly environment, it's your way or the
highway, so this should have been entirely expected.

IE comes preloaded with about 34 root certificate authorities, and it is easy
for the end user to add more, to add more in batches. Anyone can coerce open
SSL to generate any certificates he pleases, with some work.

Both Netscape 6 and MSIE 5 contain ~100 built-in, automatically-trusted CA
certs.

 * Certs with 512-bit keys.

 * Certs with 40-year lifetimes.
 
 * Certs from organisations you've never heard of before (Honest Joe's Used
   Cars and Certificates).
   
 * Certs from CAs with unmaintained/moribund websites (404.notfound.com).

These certs are what controls access to your machine (ActiveX, Java, install-
on-demand, etc etc).

  * It takes 600-700 mouse clicks to disable these certs to leave only CAs you
really trust.

(The above information was taken from A rant about SSL, oder: die grosse
 Sicherheitsillusion by Matthias Bruestle, presented at the KNF-Kongress
 2002).

Why is not someone else issuing certificates?

How many more do you need?

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-12 Thread Stefan Kelm

 Why is not someone else issuing certificates?
 
 See http://www.securityspace.com/s_survey/sdata/200206/certca.html for
 recent data re SSL certificate market share; Geotrust, at

I sincerely doubt the numbers presented in this so-called
survey. How did they get to a number of only 91,136
secure servers across all domains? There are a huge number
of CAs, many of which offer certificates to the public
(see http://www.pki-page.info/#CA). Even if most CAs will
not have a significant market share those numbers would be
different.

Cheers,

Stefan.
---
Dipl.-Inform. Stefan Kelm
Security Consultant

Secorvo Security Consulting GmbH
Albert-Nestler-Strasse 9, D-76131 Karlsruhe

Tel. +49 721 6105-461, Fax +49 721 6105-455
E-Mail [EMAIL PROTECTED], http://www.secorvo.de
---
PGP Fingerprint 87AE E858 CCBC C3A2 E633 D139 B0D9 212B


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



RE: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-12 Thread Peter Gutmann

Lucky Green [EMAIL PROTECTED] writes:

Trusted roots have long been bought and sold on the secondary market as any
other commodity. For surprisingly low amounts, you too can own a trusted root
that comes pre-installed in 95% of all web browsers deployed.

I'd heard stories of collapsed dot-coms' keys being auctioned off, that being
the only thing of value the company had left.  It makes the title of Matthias'
paper even more appropriate.

(However, I do think that anyone wanting to compromise your security will use
 this morning's MSIE hole to do it rather than buying a CA key.  OTOH it'd be a
 great universal skeleton key for government agencies charged with protecting
 the world from equestrians).

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



RE: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-12 Thread jamesd

--
On 11 Jul 2002 at 1:22, Lucky Green wrote:
 Trusted roots have long been bought and sold on the secondary
 market as any other commodity. For surprisingly low amounts, you
 too can own a trusted root that comes pre-installed in 95% of
 all web browsers deployed.

 How much, typically?

And who actually owns these numerous trusted roots? 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 y1gI63PXnGNK7Iznu3+gY+/0JLBPRaEEV/OWwPub
 20YHSnGmtg7lQW0NdXU4WMeKWfIQmlq3u3F/wjkOo


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-12 Thread RJ Harvey

Thanks for the tip!  I just got a new cert from Geotrust,
and it was such an amazing contrast to those I've gotten
from Verisign and Thawte!  They apparently take the verification
info from the whois data on the site, and you really can do
the process from start to finish in 10 minutes or so.

The cert shows that it's issued by Equifax, however.

rj

At 04:31 PM 7/10/2002 -0700, Greg Broiles wrote:
At 03:48 PM 7/10/2002 -0700, [EMAIL PROTECTED] wrote:
 --
On 6 Jul 2002 at 9:33, R. A. Hettinga wrote:
  Thawte has now announced a round of major price increases.  New
  cert prices appear to have almost doubled, and renewals have
  increased more than 50%.
[...]
Why is not someone else issuing certificates?

See http://www.securityspace.com/s_survey/sdata/200206/certca.html for 
recent data re SSL certificate market share; Geotrust, at 
http://www.geotrust.com, has 11% of the market, and appears (from their 
web pages; I haven't bought one) to be ready to issue SSL server certs 
without the torturous document review process which Verisign invented but 
Thawte managed to make simultaneously more intrusive and less relevant.


--
Greg Broiles -- [EMAIL PROTECTED] -- PGP 0x26E4488c or 0x94245961



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to 
[EMAIL PROTECTED]


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



RE: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-12 Thread Lucky Green

James wrote:
 On 11 Jul 2002 at 1:22, Lucky Green wrote:
  Trusted roots have long been bought and sold on the 
 secondary market 
  as any other commodity. For surprisingly low amounts, you 
 too can own 
  a trusted root that comes pre-installed in 95% of all web browsers 
  deployed.
 
  How much, typically?

I'd rather not state the exact figures. A search of SEC filings may or
may not turn up further details.

 And who actually owns these numerous trusted roots? 

I am not sure I understand the question.

--Lucky


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-12 Thread lynn . wheeler


and just to make sure there is a common understanding regarding SSL cert
operation ... the browser code

1) checks that the SSL server cert can be validated by ANY public key that
is in the browser preloaded list (I haven't verified whether they totally
ignore all of the cert part of these preloaded public keys ... things
like expiration date ... that these preloaded public keys are in the
preloaded list appears to be sufficient ... details like the preloaded
public keys happened to be wrappered in these certificate containers is
almost extraneous).

2) validates the signature on the SSL server cert with the corresponding
public key

3) checks if the website domain/host name is the same (or in some cases
similar) to the domain/host name specificed in the SSL server cert. I have
noticed that browsers tend to pretty much ignore the contents of these SSL
server certificates ... things like expiration date ... except the public
key, the domain/host name, and the signature (and the signature only has
real meaning within the context of
the infrastructure associated with the public key in the preloaded list
with the lowest trust/integrity level;
this is analogous to security weakest link ... a bank vault with a 4ft
think vault door doesn't do much good
if the vault has no walls).

4) uses the public key in the SSL server cert to validate communication
with the server.

all of this happens automagically from most users' standpoint (probably
less than one percent of the population even knows that there is such a
thing as a preload list).



[EMAIL PROTECTED] on 7/10/2002 at 9:12 pm wrote:

Both Netscape 6 and MSIE 5 contain ~100 built-in, automatically-trusted CA
certs.

 * Certs with 512-bit keys.

 * Certs with 40-year lifetimes.

 * Certs from organisations you've never heard of before (Honest Joe's
Used
   Cars and Certificates).

 * Certs from CAs with unmaintained/moribund websites (404.notfound.com).

These certs are what controls access to your machine (ActiveX, Java,
install-
on-demand, etc etc).

  * It takes 600-700 mouse clicks to disable these certs to leave only CAs
you
really trust.

(The above information was taken from A rant about SSL, oder: die grosse
 Sicherheitsillusion by Matthias Bruestle, presented at the KNF-Kongress
 2002).

Why is not someone else issuing certificates?

How many more do you need?

Peter.




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-12 Thread Adam Shostack

On Fri, Jul 12, 2002 at 11:18:12AM -0400, Trei, Peter wrote:
|  I'd rather not state the exact figures. A search of SEC filings may or
|  may not turn up further details.
|  
|   And who actually owns these numerous trusted roots? 
|  
|  I am not sure I understand the question.
|  
|  --Lucky
|  
| I think I do. A 'second hand' root key seems to have some
| trust issues - the thing you are buying is the private half
| of a public key pair  but that's just a piece of information.
| How can you be sure that, as purchaser, you are the *only*
| possessor of the key, and no one else has another copy (the
| seller, for example)?

Who cares?  If I can get a key thats in the main browsers for 90% off,
who cares if other people have it?

I understand that getting the public half of the 2 main browsers will
run you about $250k in fees, plus all the setup work.  If I can buy a
slightly used Ncipher box whose public key bits are in the browsers
for a 10th to a 5th of that, the extra copies of the bits aren't all
that worrisome to me.

Adam

-- 
It is seldom that liberty of any kind is lost all at once.
   -Hume



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-10 Thread jamesd

--
On 6 Jul 2002 at 9:33, R. A. Hettinga wrote:
 Thawte has now announced a round of major price increases.  New
 cert prices appear to have almost doubled, and renewals have
 increased more than 50%. While Thawte proclaims this is their
 first price increase in five years, this comes at a time when we
 should be seeing *increased* competition and *lower* prices for
 such virtual products, not such price increases.  But of course,
 in an effective monopoly environment, it's your way or the
 highway, so this should have been entirely expected.

IE comes preloaded with about 34 root certificate authorities, and
it is easy for the end user to add more, to add more in batches.
Anyone can coerce open SSL to generate any certificates he
pleases, with some work.

Why is not someone else issuing certificates?

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 FgD9xqiaNt/GIr99+cDvezUuY9K7pVf/sr8sYLtx
 2U+1rnhprPRzvE4aLRCq4ADtyF4DDrnAKjbwHgbFn


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-10 Thread Greg Broiles

At 03:48 PM 7/10/2002 -0700, [EMAIL PROTECTED] wrote:
 --
On 6 Jul 2002 at 9:33, R. A. Hettinga wrote:
  Thawte has now announced a round of major price increases.  New
  cert prices appear to have almost doubled, and renewals have
  increased more than 50%.
[...]
Why is not someone else issuing certificates?

See http://www.securityspace.com/s_survey/sdata/200206/certca.html for 
recent data re SSL certificate market share; Geotrust, at 
http://www.geotrust.com, has 11% of the market, and appears (from their 
web pages; I haven't bought one) to be ready to issue SSL server certs 
without the torturous document review process which Verisign invented but 
Thawte managed to make simultaneously more intrusive and less relevant.


--
Greg Broiles -- [EMAIL PROTECTED] -- PGP 0x26E4488c or 0x94245961



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]