Re: Fwd: cacert.org

2006-02-17 Thread Gervase Markham
Kyle Hamilton wrote: As I recall, cacert.org was planning to be audited by one of the Mozilla guys directly. I don't know who, and I don't know when, but I kinda recall some discussion of this. I remember hearing someone say this, but when I asked, the name given wasn't anyone I'd ever heard

Re: Forcing specific CA for domain

2006-08-18 Thread Gervase Markham
Balint Balogh wrote: Without this security measure, any CA that has its certificates in client software has the power to thwart SSL/TLS security by issuing fake certificates claiming to belong to *.example.com servers or email addresses. If you think they might do that, why might they not do

Extended Validation Certificates

2006-11-03 Thread Gervase Markham
[Important note: this discussion is taking place in mozilla.dev.security; please respect the Followup-To: header.] For some time, the Mozilla Foundation has been taking part in a group called the CA/Browser Forum (CABF), an association of the major public-facing CAs and all the major

Re: Firefox with encoding/decoding of local files

2007-01-08 Thread Gervase Markham
Wolfgang Eibner wrote: Hi! I would like to have an Firefox (Portable) started from a CD and showing HTML files from the CD. The html files on the cd should be encrypted because so the can't be copied from the CD easily. This approach will never succeed in the long run. You are giving your

Re: Mozilla Products Included Certificates

2007-03-01 Thread Gervase Markham
Gervase Markham wrote: If I am correct, then it seems that the following Firefox minor release transitions added new certs: * Firefox 1.0.1 - 1.0.2(UserTrust) * Firefox 1.5.0.9 - 1.5.0.10 (Taiwan GRCA, Firmaprofesional, Wells Fargo, Swisscom, GeoTrust

Re: Restricting roots to one TLD

2007-03-13 Thread Gervase Markham
Frank Hecker wrote: Of course using name constraints in the classic sense requires the cooperation of the CA (since they have to add the extension to the CA cert). I think Gerv was thinking of the more general case where for policy reasons we might want to impose constraints on a CA even in

Re: Restricting roots to one TLD

2007-03-14 Thread Gervase Markham
Bob Relyea wrote: In addition, we only parse these kinds of constraints on intermediate certs (we currently don't have a mechanism to place name constraints on a trusted root. Even if the trusted root had constraints itself, they would be ignored once we identify the cert as trusted. Would

Re: Expiration of trust roots

2007-03-14 Thread Gervase Markham
Paul Hoffman wrote: A related question that I was intending to do some research on: if a trust anchor (trusted root in this thread) has an expiration date in the past, doe NSS still treat it as a trust anchor, or does it ignore it? I can't say for certain because I haven't seen the code, but

Revision of Contributors Agreement

2007-03-14 Thread Gervase Markham
We are revising the Mozilla project Contributors Agreement (CVS access agreement) to address deficiences caused by the passage of time, and the upcoming problem that if and when we migrate away from CVS, a lot of the document will become inappropriate. The new document is an agreement with a

Re: Revision of Contributors Agreement

2007-03-20 Thread Gervase Markham
timeless wrote: Did Camino do this when they created, added, or enhanced their security UI? Possibly not; you'd need to ask them. To provide a more amusing variant. Did the people who wrote help (Netscape, and third parties) for the Security UI in Mozilla 1.7 or Firefox (to the extent that

Re: Restricting roots to one TLD

2007-03-21 Thread Gervase Markham
Kyle Hamilton wrote: I thought we'd had this type of conversation before... or maybe it was on the TLS discussion list, and I'm not remembering. Regardless... I don't remember participating in one; maybe I wasn't around, or maybe it was elsewhere. Regardless, you need to dust off your trusty

Re: Revision of Contributors Agreement

2007-03-22 Thread Gervase Markham
Gervase Markham wrote: I am drawing this to the attention of the Mozilla cryptography community especially, because the document contains a section (Section 5) which explicitly deals with cryptographic code. So far, I haven't made any significant changes to it in the new draft. Does anyone

Re: Restricting roots to one TLD

2007-03-23 Thread Gervase Markham
Kyle Hamilton wrote: The Mozilla Foundation is the authority which determines whether a given root certificate is included in its default certificate list. If you're going to assert that it's provable, you suddenly create a lot more liability for the Foundation -- because it's not provable.

GlobalSign Root Certificate Inclusion Request

2007-04-04 Thread Gervase Markham
GlobalSign has applied to add some certs to the Mozilla root store, as documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=367245 and in the pending certificates list here: http://www.mozilla.org/projects/security/certs/pending/ I have evaluated their request, as per

DigiCert Root Certificate Inclusion Request

2007-04-04 Thread Gervase Markham
DigiCert has applied to add some certs to the Mozilla root store, as documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=364568 and in the pending certificates list here: http://www.mozilla.org/projects/security/certs/pending/ I have evaluated their request, as per the

Re: Expiration of trust roots

2007-04-12 Thread Gervase Markham
Paul Hoffman wrote: At 10:00 AM + 3/14/07, Gervase Markham wrote: Paul Hoffman wrote: A related question that I was intending to do some research on: if a trust anchor (trusted root in this thread) has an expiration date in the past, doe NSS still treat it as a trust anchor, or does

Re: Restricting roots to one TLD

2007-04-12 Thread Gervase Markham
Nelson Bolyard wrote: Your proposal would require storing the equivalent of a name constraints extension along with the root CA cert. It would also require additional processing, because name constraints are generally not processed inside trust anchors. That is, usually a CA puts the name

Keynectis Root Certificate Inclusion Request

2007-04-13 Thread Gervase Markham
Keynectis has applied to add some certs to the Mozilla root store, as documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=335392 and in the pending certificates list here: http://www.mozilla.org/projects/security/certs/pending/ I have evaluated their request, as per the

JSS questions: how to decode extensions?

2007-04-20 Thread Gervase Markham
I've been feeling my way around the JSS API. The Using JSS document, the FAQ and the test code are (just) enough to get going. But I've come across several points where the API seems really low-level. I was wondering if I've missed something? I can go through the following long chain to find

Re: Amending Mozilla's Root CA cert policy with key size requirements

2007-05-02 Thread Gervase Markham
Nelson Bolyard wrote: I propose that we add additional requirements to the policy for root CAs that apply for inclusion in mozilla products. I propose that we require a minimum key size for the root CA cert *AND* for any intermediate CA certs issued by that root CA cert. Here's why. I

Re: Amending Mozilla's Root CA cert policy with key size requirements

2007-05-08 Thread Gervase Markham
Nelson Bolyard wrote: I propose that we add additional requirements to the policy for root CAs that apply for inclusion in mozilla products. I propose that we require a minimum key size for the root CA cert *AND* for any intermediate CA certs issued by that root CA cert. Here's why. I have

StartCom Root Certificate Inclusion Request

2007-05-23 Thread Gervase Markham
StartCom has applied to add some certs to the Mozilla root store, as documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=362304 and in the pending certificates list here: http://www.mozilla.org/projects/security/certs/pending/ I have evaluated their request, as per the

CAs and country restrictions

2007-05-24 Thread Gervase Markham
There are currently two CAs who have applied for inclusion in the NSS store but their audits were done by their respective governments and are classified, and/or they are directly controlled by those governments. They are: KISA (South Korea, .kr)

Re: CAs and country restrictions

2007-05-24 Thread Gervase Markham
David E. Ross wrote: I believe that trust should require public disclosure. Citizens of France have no choice but to trust their government, to a certain extent. In that the government can exercise jurisdiction over them. Is the proposed certificate arrangement not just a reflection of

Re: CAs and country restrictions

2007-05-24 Thread Gervase Markham
Paul Hoffman wrote: That makes the assumption that all domains from those countries are in the countries' TLDs; that is a bad assumption. You mean that these CAs will not be able to sign certificates for some sites that they might want to (e.g. www.myfrenchsite.com)? Yes, but that's just

Re: StartCom Root Certificate Inclusion Request

2007-05-25 Thread Gervase Markham
Merely commenting on matters of fact: Kaspar Brand wrote: That doesn't imply everything was perfect with this application at that time. Have you ever seen a root certificate with a nonRepudiation keyUsage extension? Yes, Startcom's current one does have that... Or, what RSA key size would you

Re: CAs and country restrictions

2007-05-25 Thread Gervase Markham
Frank Hecker wrote: So the question is, if a government CA provided a statement roughly equivalent to the (public) WebTrust report, would that be sufficient for us? I think the answer is arguably yes, provided that we have the same general level of confidence in the organization doing the

Re: StartCom Root Certificate Inclusion Request

2007-05-25 Thread Gervase Markham
Alaric Dailey wrote: There were CAs approved in the past with non-webtrust audits much older then that. Just see http://hecker.org/mozilla/ca-certificate-list As a point of fact, that list is not a list of approved CAs, it's a list of applications. Gerv

Re: CAs and country restrictions

2007-05-28 Thread Gervase Markham
Paul Hoffman wrote: The current thread is about a proposal that says, in essence, we are willing to accept a secret audit of a trust anchor that we cannot see from a national government security agency, but if we accept that, the trust anchor can only bind identities that contain a domain

Re: CAs and country restrictions

2007-05-28 Thread Gervase Markham
Benjamin Smedberg wrote: I prefer to think of this in terms of limiting expoure: the Korean government should have the ability to define our trust of the .ko domain, but not our trust of non-.ko domains. That's a good way to put it. Gerv ___

Re: CAs and country restrictions

2007-05-29 Thread Gervase Markham
David E. Ross wrote: Face it: some governments are corrupt. Others are not corrupt in the sense of officials taking bribes and acting on their self-interests, but they act in ways that western democracies might find offensive. In this latter group are nations that practice or at least allow

Re: CAs and country restrictions

2007-05-30 Thread Gervase Markham
David E. Ross wrote: Your last sentence is exactly my point. It would be very difficult to create an objective policy that allows some governments to certify CAs but not allow others. This is true without regard for the issue of secret certifications. An objective policy would be all

Re: CAs and country restrictions

2007-05-30 Thread Gervase Markham
Gervase Markham wrote: My proposal is that we accept such CAs, but use this technical capability to restrict them to signing certificates for domains under the appropriate TLD. Having considered the discussion, it looks like this idea is not going to fly. Instead, we will do what Frank

Re: Proposal for improving the security of add-on updates

2007-06-18 Thread Gervase Markham
Dave Townsend wrote: What I want is to be able to be able to establish some trust that the update file retrieved is correct, and has not been tampered with, intercepted and is as it was originally written by the add-on author. Link Fingerprints was designed for precisely this purpose, and is

Re: Proposal for improving the security of add-on updates

2007-06-22 Thread Gervase Markham
Dave Townsend wrote: It doesn't cover those that won't pay for the SSL and don't want to host on AMO. Yes there are people saying they are in that situation. Numbers are difficult to guess at though. I'm sure there are people saying they are in that situation; there are people who want

Re: Proposal for improving the security of add-on updates

2007-06-25 Thread Gervase Markham
Arrakis wrote: Why not use digital certificates provided by CACert. They are free, and have high levels of assurity, as opposed to a CAs like Verisign that have little to no assurity, and charge a ransom. Because CAcert have not applied for inclusion into (and therefore, obviously, not been

A-Trust Root Certificate Inclusion Request

2007-06-27 Thread Gervase Markham
A-Trust has applied to add some certs to the Mozilla root store, as documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=373746 and in the pending certificates list here: http://www.mozilla.org/projects/security/certs/pending/ I have evaluated their request, as per the

Re: Proposal for improving the security of add-on updates

2007-06-28 Thread Gervase Markham
Jean-Marc Desperrier wrote: Gervase Markham wrote: Jean-Marc Desperrier wrote: You don't care *who* the owner of the cert is. What you care about is if he intends to use his signing cert to distribute spyware extensions. And his identity tells you nothing about that. No, but it does tell

Re: A-Trust Root Certificate Inclusion Request

2007-06-28 Thread Gervase Markham
Eddy Nigg (StartCom Ltd.) wrote: Under section 6 of the Mozilla CA policy (http://www.mozilla.org/projects/security/certs/policy/) it states: /provide some service relevant to typical users of our software products/ This CA seems to issue certificates to Austrian citizens only Are

Re: A-Trust Root Certificate Inclusion Request

2007-06-29 Thread Gervase Markham
Eddy Nigg (StartCom Ltd.) wrote: If I remember right, there was a discussion on that issue? Don't remember its outcome however...Perhaps the Mozilla CA policy should be clearer in that respect and explain if a CA should be public or not (Assuming that a CA for Austria citizens only is not a

Re: Link-fingerprints: weak unless link received securely

2007-07-02 Thread Gervase Markham
Nelson B wrote: One needs a trusted source AND a trusted channel to that source. Yes, although there's also a herd immunity feature, as I discuss below. At the moment, spotting things like the Wordpress download tarball trojan took quite a while, because someone had to bother to check the

Re: Link-fingerprints: weak unless link received securely

2007-07-09 Thread Gervase Markham
Michael Vincent van Rantwijk, MultiZilla wrote: Note that we asked (per e-mail) the top 500 download sites, and most of them prefer to wait and see what Link Fingerprinting is and can do for them, because so far nobody really believes that it will do any good for them, but that it will add

Re: Link-fingerprints: weak unless link received securely

2007-07-11 Thread Gervase Markham
David E. Ross wrote: On 7/9/2007 1:07 PM, Gervase Markham wrote: Michael Vincent van Rantwijk, MultiZilla wrote: Hm, and where is this 15% coming from? Just another assumption? It's a conservative estimate of the market share of Firefox. Gerv That implies the assumption that ALL Firefox

Re: Enhancing security of extension by signing them

2007-07-12 Thread Gervase Markham
Jean-Marc Desperrier wrote: But I'd like to point out I'm not the only who is doubtful about the real level of authentication current commercial CA provide for code signing certificate. No. I also have my doubts in this area. That's one reason I think EV is important. - grev : barrier to

Re: A-Trust Root Certificate Inclusion Request

2007-07-12 Thread Gervase Markham
I apologise for the delay in looking at this. Eddy Nigg (StartCom Ltd.) wrote: 2.) The links under section documents point to various CA policies and practices: With the exception of question 1, which you have already addressed, these are all good questions. Thank you very much for taking

ARGE DATEN Root Certificate Inclusion Request

2007-07-16 Thread Gervase Markham
ARGE DATEN has applied to add some certs to the Mozilla root store, as documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=348987 and in the pending certificates list here: http://www.mozilla.org/projects/security/certs/pending/ I have evaluated their request, as per

IdenTrust Root Certificate Inclusion Request

2007-08-15 Thread Gervase Markham
IdenTrust has applied to add some certs to the Mozilla root store, as documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=359069 and in the pending certificates list here: http://www.mozilla.org/projects/security/certs/pending/ I have evaluated their request, as per the

Re: IdenTrust Root Certificate Inclusion Request

2007-08-17 Thread Gervase Markham
Eddy Nigg (StartCom Ltd.) wrote: Gerv, can you change the links of the certificates of http://www.mozilla.org/projects/security/certs/pending/#IdenTrust to something installable in Firefox? http://apps.identrust.com/roots/DSTROOTCAX3.cer seems to send the wrong headers, even so the

Re: Updating Mozilla CA certificate policy to address EV certificates

2007-10-20 Thread Gervase Markham
Frank Hecker wrote: The above is why I don't think we need to reference the WebTrust document specifically. Your thoughts? Sounds fine. :-) If, in some strange universe, the CABForum decided not to require audits for compliance any more, then we could just update our policy again. Gerv

Re: Mozilla vs. Code Signing

2007-11-16 Thread Gervase Markham
Nelson Bolyard wrote: I suspect (and speculate here) that this is because code signing just isn't very important to Mozilla. I think it may (also) be true that all of the Mozilla people subscribed either do not know very much about code signing (me, for one) or don't feel empowered to speak

Re: TURKTRUST root CA certificate inclusion request

2007-11-30 Thread Gervase Markham
Eddy Nigg (StartCom Ltd.) wrote: I think what Jean-Marc (and me previously) meant, is not related to the domain name or email address but about the other details in the subject line. Obviously the CN (or emailAddress) field is to be verified accordingly... Oh, I see. Yes, it's definitely

Re: Some more CA infrastructure questions

2007-11-30 Thread Gervase Markham
C.J. Adams-Collier wrote: * Date of last audit For CAs approved under the new regime, this information is tracked informally as text in their approval notice, plus also you can click through to their WebTrust etc. statement to see. * Auditor profile What is that, exactly? * Canonical

Re: TURKTRUST root CA certificate inclusion request

2007-12-04 Thread Gervase Markham
Eddy Nigg (StartCom Ltd.) wrote: Pure ASCII / Latin characters would do...do we need a spec for that? How did a discussion about avoiding homograph spoofing turn into a suggestion that we only allow Latin characters? That's entirely unreasonable. We've spent years working on things like IDN

Re: Some more CA infrastructure questions

2007-12-04 Thread Gervase Markham
C.J. Adams-Collier wrote: Organization contact information; certificate of authenticity; certifying body; name, birth date, governmental ID, blood type, gender of all personnel; you know... the usual :) We have some of this - see the list.

Re: Proposed NSS wildcard cert acceptance change - any angst?

2007-12-04 Thread Gervase Markham
Nelson Bolyard wrote: Now, there is a request asking that NSS's code for matching the application's desired host names to the names in the cert adopt the more restricting IETF standards, and the NSS team wholeheartedly agrees. What is the rationale for the request? Does it increase security in

Re: TURKTRUST root CA certificate inclusion request

2007-12-05 Thread Gervase Markham
Eddy Nigg (StartCom Ltd.) wrote: I explained it before. Because YOU can't read the subject line /C=ישראל/ST=דרום/O=סטארטקום בעמ/CN=אדי ניק It's completely useless to you. Absolutely. So I would seriously consider not trusting a site with such a subject line. A passport or international

Re: TURKTRUST root CA certificate inclusion request

2007-12-06 Thread Gervase Markham
Eddy Nigg (StartCom Ltd.) wrote: Gervase Markham wrote: Eddy Nigg (StartCom Ltd.) wrote: I explained it before. Because YOU can't read the subject line /C=ישראל/ST=דרום/O=סטארטקום בעמ/CN=אדי ניק It's completely useless to you. Absolutely. So I would seriously consider not trusting

Re: WISeKey root CA certificate inclusion request

2008-02-09 Thread Gervase Markham
Eddy Nigg (StartCom Ltd.) wrote: But back to our issue, if a compromised server issues a certificate from within the name constraint and uses it to attack another user (by claiming to send mail from [EMAIL PROTECTED] or setting up a fake site for https://really.allowed-domain.com), this

Re: WISeKey root CA certificate inclusion request

2008-02-09 Thread Gervase Markham
Eddy Nigg (StartCom Ltd.) wrote: So it would be fine with you, if you've received a signed document or email (even encrypted) and you are going to trust your VISA and other personal data to a spoofed email or web site, issued by such a Blackbox CA? It wouldn't be fine with me; my point is

Re: WISeKey root CA certificate inclusion request

2008-02-13 Thread Gervase Markham
Frank Hecker wrote: I didn't quite say that, but I can understand why Kyle interpreted my comments that way. What I have said in the past is that because of the impact of removing a root, particular a root that has lots of server certs chained up to it, we're not going to remove a root

Re: WISeKey root CA certificate inclusion request

2008-02-13 Thread Gervase Markham
David E. Ross wrote: Periodic audits of CAs are required by WebTrust to maintain their seal of approval and should thus be required by Mozilla for continued inclusion in the NSS store. I don't know if it's in the policy explicitly, but it's always been my view that if a CA failed its

Re: WISeKey root CA certificate inclusion request

2008-02-13 Thread Gervase Markham
Kyle Hamilton wrote: Why, as a user, am I being asked by ANYONE in this forum if I can point to any CA that is violating their CPS, or 'not keeping up with their auditing'? Why does anyone even remotely think that this is appropriate? The fact that I caught Thawte violating their CPS at the

Re: What we want [was: Audit requirements for government CAs]

2008-04-02 Thread Gervase Markham
Eddy Nigg (StartCom Ltd.) wrote: Currently the ratio of EV certs is below 1% of overall SSL secured web sites. If EV doesn't get a significant market share, your priorities might have been wrong and we should have addressed other issues as well. I don't really have the bandwidth to dive

Re: What we want [was: Audit requirements for government CAs]

2008-04-02 Thread Gervase Markham
Kyle Hamilton wrote: Please tell me how to completely disable all Mozilla Foundation included CAs without having to individually change the trust settings on all of them? I can't trust Mozilla's certificate policy to protect my interests -- I can't trust Mozilla's policy to ensure that

Re: Anti-spam changes to dev-tech-crypto mailing list

2008-04-26 Thread Gervase Markham
Nelson B Bolyard wrote: The situation has simply become intolerable, so as your list moderator, I have taken steps to cut it off, and am prepared to take more steps. As moderator, you of course have that right. I would note for your info that the IT team at the Corporation are aware of this

Re: Anti-spam changes to dev-tech-crypto mailing list

2008-04-30 Thread Gervase Markham
Nelson B Bolyard wrote: Thanks for telling me. Is that being discussed in some newsgroup or mailing list? I'd like to follow the progress on that topic. https://bugzilla.mozilla.org/show_bug.cgi?id=425122 Gerv ___ dev-tech-crypto mailing list

Re: Anti-spam changes to dev-tech-crypto mailing list

2008-05-07 Thread Gervase Markham
Nelson B Bolyard wrote: It seems that our mailing list server does not apply ANY of its mail filters to messages that go through the news-mail gateway, so those filters provide no relief against spam from the news server. I have now taken the next step. I have disabled the news-mail

Re: Including FNMT cert in Firefox 3 (Spanish government)

2008-05-23 Thread Gervase Markham
pascal wrote: FNMT has emailed gerv asking if they should open a separate bug or not asking if we needed more information and if they were following the right process. They didn't get any response that's why I attached the files they had sent to the bug. If people are emailing me specifically

Re: Modulus length (was Re: Draft CA information checklist)

2008-05-31 Thread Gervase Markham
Paul Hoffman wrote: Let's talk specifics. The Verisign Class 3 Public Primary Certification Authority, which is widely used to create popular SSL certs on the Internet (see https://www.amazon.com/), has a 1024-bit RSA key and has an expiration date of Aug 1 23:59:59 2028. Yes, that's a bit

Debian Weak Key Problem

2008-06-04 Thread Gervase Markham
[Please respect the Followup-To header, set to mozilla.dev.security] Many of you will know about the problem with weak keys generated on Debian or Debian-derivative systems between certain dates.[0] This affects SSL certificates generated on those systems. CAs trusted by Firefox have signed, and

Re: Debian Weak Key Problem

2008-06-06 Thread Gervase Markham
Andrews, Rick wrote: I just wanted to mention that we've been working feverishly to automate checking of all valid certs in our databases. It's taking time because it's a huge task - we have hundreds of thousands of certs to check - but we intend to notify any customer who is using a weak key.

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Gervase Markham
Kyle Hamilton wrote: There has been evidence of Microsoft, at the least, following this group and acting on good ideas that started here. We do talk to each other, you know :-) January 1 2009 particularly because it provides slightly less than 2 quarters of notice. Indeed. Which doesn't

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Gervase Markham
Rob Stradling wrote: FYI, Microsoft already require a minimum 2048-bit RSA key size for new Root Certificate submissions. Then we might want to implement the same policy, with an exception (for compatibility reasons) for roots which already have a signficant degree of deployment but which, for

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-09 Thread Gervase Markham
Nelson B Bolyard wrote: But one could imagine that we make use of them, and allow the values of the CKA_END_DATE to be different from (earlier than) the notAfter date in the related certificate. It's good to know that this is technically possible. But actually, I don't see this as a high

Re: Entrust EV request

2008-06-09 Thread Gervase Markham
Frank Hecker wrote: I agree that it would be a good thing if Entrust (or any CA, for that matter) used technical means (like sending email to postmaster or whatever) to verify domain name ownership for non-EV SSL certs, in addition to whatever other procedures are used. In the past, at

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Gervase Markham
Jean-Marc Desperrier wrote: Kaspersky Lab announces the launch of Stop Gpcode, an international initiative against the blackmailer virus http://www.kaspersky.com/news?id=207575651 That seems pointless to me. If they crack it after a few months, the virus author will just generate a new key

Re: Debian Weak Key Problem

2008-06-11 Thread Gervase Markham
Robert Relyea wrote: 1) work with CA's, in their existing infrastructures to get those certs revoked. 2) include that list of keys in the browser itself to detect this compromise. 3) build a parallel revocation scheme to phone home to mozilla (a.la. anti-phishing) to identify sites with

Re: Debian Weak Key Problem

2008-06-12 Thread Gervase Markham
Jean-Marc Desperrier wrote: Well, CRL can also be made to scale properly to handle a large number of revocation, but this requires a few operationnal changes. ...which presumably have to be made before you issue the certs? The alternative in order to avoid changing the CA constantly would be

Re: questionable CA practices: CA's generating users' private keys

2008-06-30 Thread Gervase Markham
Nelson Bolyard wrote: Do we really want to allow this? Should this at least be a question that CAs must answer as they apply for cert inclusion or EV status upgrades? At a minimum, please add it to the Questionable CA practices document on the wiki. It doesn't sound particularly wise to me.

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-21 Thread Gervase Markham
Nelson Bolyard wrote: If you haven't already done so, read Dan Kaminsky's slides from his talk at blackhat. http://www.doxpara.com/DMK_BO2K8.ppt After he presents the DNS attack, he talks about SSL, certs, and what browsers must do to get read security against DNS attacks from SSL and

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Gervase Markham
Eddy Nigg wrote: Even though I'm in favor of not mixing EV and other content, I think this argument is moot. Chances that such an attack on a CA is successful is most likely less than having you encounter such an attack yourself. What makes you think that's true? Attacking a CA's DNS server

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Gervase Markham
Kyle Hamilton wrote: Even in the case where you require all-EV content, if you try to perform any additional matching of the Subject (which is what needs to be matched anyway) you're going to break third-party data feeds and services. For example, in the aforementioned case, even if Google

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-25 Thread Gervase Markham
Eddy Nigg wrote: Because CAs (SHOULD) have controls in place to prevent that. Well, of course. But if another vulnerability in DNS is discovered like the recent one, no amount of controls is going to help for the period during which the Internet remains unpatched (assuming it's fixable at all -

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-25 Thread Gervase Markham
Nelson B Bolyard wrote: How does the user a) know that some content is the responsibility of a different entity than the one identified by Larry, and b) find the identity of the entity responsible for that other content? They don't, because any UI which attempted to display all the

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-25 Thread Gervase Markham
Eddy Nigg wrote: Gervase Markham: Exactly my point. If the CA's DNS is secure, the EV system is safe. If it's not, it's not. So the two are linked, and they shouldn't be. I think you meant DV, not EV here... No, I mean EV, because the security of EV depends on the security of DV

Re: Bug 455162 - Provide a FIPS 140-2 compatibility mode

2008-08-25 Thread Gervase Markham
Kyle Hamilton wrote: MisterSSL, I'm rather appalled that you are ignoring the realities of US government user requirements. I would note in this connection that the Mozilla project as a whole does not seem to have enterprise use as a specific goal - although many enterprises happily use it.

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-26 Thread Gervase Markham
Kyle Hamilton wrote: My view: Anything that comes from an EV-validated site should be viewed as being approved by that EV-validated site. Right. So shouldn't we be concerned if it's possible, by subverting DNS, to make this not true for EV+DV mixed sites? The details of the contracts are

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-26 Thread Gervase Markham
Eddy Nigg wrote: Well yes, EV shouldn't mix with DV... Right! So, after all that arguing, you actually agree with me? Gerv ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-27 Thread Gervase Markham
Eddy Nigg wrote: I wouldn't state it this way, otherwise we urgently need to modify the Mozilla CA policy! An attacker shouldn't be successful in such an attempt and CAs should have controls in place to detect such attempts. If that's true, then what controls to Startcom (to take an example)

Re: revocation of roots

2008-10-22 Thread Gervase Markham
Julien R Pierre - Sun Microsystems wrote: If the root could revoke itself, in the case of root cert key compromise, ie. the root cert's private key becoming public, anybody could then sign revocation information for that root CA - whether to mark it revoked or unrevoked. Leaving aside the

Re: Unbelievable!

2008-12-23 Thread Gervase Markham
Frank Hecker wrote: Do you mean the UTN-UserFirst-Hardware root? According to the screenshot on your blog post, that's the root the bogus cert chains up to. Also, if we were to take action of this general sort (as a hypothetical), what about adding the PositiveSSL CA cert to NSS with the SSL

Re: Unbelievable!

2008-12-27 Thread Gervase Markham
Michael Ströder wrote: Given the large amount of self-generated server certs this problem already exists. Large number != large % of visits. A million Joe Publics might use the Internet for 5 years to do their online shopping without once encountering a self-signed cert or a certificate error.

Re: Unbelievable!

2008-12-27 Thread Gervase Markham
sayrer wrote: The truth is that we are basically unable to act without a lot of collateral damage. We should keep this in mind with future security technology. Relying on companies willing to take money for doing absolutely nothing (not even the bare minimum they agreed to) is not a pleasant

Re: dispute resolution procedures for Mozilla CA module

2008-12-27 Thread Gervase Markham
Kyle Hamilton wrote: How would this work? Split nssckbi out to be managed by the non-code module owner, though a coder would need to be enlisted to finalize the decisions made by that person? Non-code module arrangements don't require code changes. As I understand it, having a CA Certificate

Re: Unbelievable!

2008-12-27 Thread Gervase Markham
Eddy Nigg wrote: On 12/27/2008 02:34 PM, Gervase Markham: One of the points of EV was to allow us to act against a CA without massive collateral damage. We can remove EV status from a root without disabling the root entirely. Which unfortunately isn't really effective for the issue we

Re: Unbelievable!

2008-12-30 Thread Gervase Markham
Ben Bucksch wrote: We try to train users to check that the bar is green (on sites where it was green before), and not use the site when it's merely blue. Otherwise, EV is useless, as the scammer could get a, say, CertStar cert, to fake an EV site, right? Only when people start getting

Re: Words from Comodo?

2008-12-30 Thread Gervase Markham
Ian G wrote: As far as I heard, the CABForum was also formed or inspired from a similar group of vendors (browsers) that got together at the invite of the Konqueror guy to talk about phishing one day ... I'm fairly sure it wasn't at the invitation of the Konqueror guy (George Staikos), but a

Re: PositiveSSL is not valid for browsers

2008-12-31 Thread Gervase Markham
Eddy Nigg wrote: perhaps Mozilla should start to use EV certs for the update mechanism of Firefox and *enforce* it? There might be many other sites which potentially could wreak havoc not measurable in terms of money only. Perhaps we should. Can you file a bug about this, please? There may be

Re: PositiveSSL is not valid for browsers

2008-12-31 Thread Gervase Markham
Kyle Hamilton wrote: Hmmm... actually, it would be possible, but only with the cooperation of the CAs. We currently know the EV policy OIDs for EV-enabled roots. What we don't know is the policy OIDs assigned for different types of validation, ...nor do we have, more to the point, a

Re: CABForum place in the world

2009-01-01 Thread Gervase Markham
Ian G wrote: My personal view of Mozilla is this: the ecosystem is developer-led. But the ecosystem isn't our representative on the CAB Forum. Our current representative is Johnathan Nightingale, our Human Shield and security and user experience expert. Gerv

  1   2   3   >