On 24/11/10 7:51 AM, [email protected] wrote:
On what basis do you make the (implicit) assumption that cert privkeys
were actually stolen?
For me, it would be Preponderance of evidence, or in non-legal terms
"more likely than not."
Note; I do not claim to have any evidence the pubkeys were factored,
etc., I'm just wondering on what basis you jump to assuming it was
a node security failure.
Yeah. We are somewhat hamstrung in our analysis because we have little
or no direct evidence. We aren't viewing the direct facts of what is
occuring, we're having to derive our view from indirect information such
as media reports, narrow anecdotes from our work, our risk analyses of
likelihood of attacks, and our own general experience.
So, for example, we know some things:
CAs aren't rushing to revoke their roots and jump to higher strength,
/and/ user certificates seem to identified and revoked from time to time.
There is a history of breaches. At some point in the past there was
a company reporting that Linux servers were being breached at around
4000 per month (IIRC); we know that packages of Linux servers are
bought & sold on the attacker markets. Acquiring a stolen cert is
therefore cheap.
We can calculate the cost of a root key factoring, and we can also
see some data points of root attacks (one MD5-without-nonces sub-root
was crunched about 1-2 years back).
The security UI work suggests that the whole UI link of the security
chain is marginal, and most known attacks are aggregate rather than
targetted, so the use of a stolen cert seems as plausible as using a
"perfect" cert.
Etc, etc.
iang
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography