On 5/09/11 7:23 PM, Gervase Markham wrote:
Hi Peter,
On 04/09/11 07:15, Peter Gutmann wrote:
Blacklist-based validity checking, the Second Dumbest Idea in Computer
Security (Marcus Ranum), doesn't work:
Diginotar issued certs for which there was no record of issuance, therefore
they couldn't be revoked. Whitelist-based checking would have prevented
this.
Surely OCSP is whitelist-based checking? (I can't imagine engineering an
OCSP server which, when asked about a certificate for which it had no
record, said "Fine, no problem!")
Apparently no need to stress our imagination ;)
====================
Current browsers perform an OCSP check as soon as the browser connects
to an SSL protected website through the https-protocol3. The serial
number of the certificate presented by the website a user visits is send
to the issuing CA OCSP-responder. The OCSP-responder can only answer
either with „good‟, „revoked‟ or „unknown‟. If a certificate serial
number is presented to the OCSP-responder and no record of this serial
is found, the normal OCSP-responder answer would be „good‟4. The
OCSP-responder answer „revoked‟ is only returned when the serial is
revoked by the CA. In order to prevent misuse of the unknown issued
serials the OCSP-responder of DigiNotar has been set to answer „revoked‟
when presented any unknown certificate serial it has authority over.
This was done on September 1st.
====================
http://www.rijksoverheid.nl/documenten-en-publicaties/rapporten/2011/09/05/diginotar-public-report-version-1.html
Universal implicit cross-certification makes the entire system as weak as the
weakest link:
Diginotar apparently issued certs for other majors CAs like Equifax, Thawte,
and VeriSign, allowing them to usurp other major CAs.
I would disagree that _this_ makes the entire system as weak as its
weakest link. It only makes systems which choose to interlink in any way
as weak as the weakest link.
The thing which makes the entire system as weak as its weakest link is
the lack of CA pinning.
No, this is putting the solution before the problem. What makes the
system as weak as its weakest link is the fact that all CAs are
homogonised and anonymised within the vendors' products.
That's vendor policy.
A possibly fix to that is CA pinning, which is a partial and judicious
unwinding of the policy of homogonisation and anonymisation.
Whether this is efficacious or worth the money is yet to be seen.
Whether subscriber-side CA pinning is better than other alternates (e.g.
browser-side CA pinning or CA branding) is also open to question.
But, if the vendors choose to back one horse, then that's where the
public's money goes. So we might not ever find out whether other
solutions help.
iang
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography