On 02/07/2012 01:36 PM, ianG wrote:
On 7/02/12 20:56 PM, Marcus Brinkmann wrote:
Hi,

On 02/07/2012 03:52 AM, Steven Bellovin wrote:
http://arstechnica.com/business/guides/2012/02/google-strips-chrome-of-ssl-revocation-checking.ars



While I am no fan of CRLs, I think it's worth mentioning that Google's
primary objective here does not at all seem to be the security of
anything except their position in the race for the fastest browser:


The first thing to ask is whether CRLs/OCSPs have benefit security *at
all*.

Google's suggestion is no. I would agree. Theory predicts that the
combined weight of problems, well researched and experimentally measured
by now, will lead to revocation being more or less ineffective.

That seems to be their argument only when it comes to maintenance revocations. The argument rather seems to be that if you are disconnected from rest of the internet, you can only rely on two sources of information: the ones given by the server you want to connect to (the "captive portal") and the data you are carrying around on your computer. So Langley wants to move the CRL to the local storage of the computer, delivered with automatic updates.

Implicitely, Langley seems to suggest that the only useful data you are allowed (or able) to carry around on your computer comes from Google with automatic updates.

That's a false dilemma. You could also extract trust from your cache, ie your past experience with the same server (the SSH model), and/or from your past connections with the internet (CRL or monitoring servers differently from Google Chrome autoupdater).

Langley doesn't state why he is limiting the options in this way. It is probably a mix of cultural bias and technical reasons (performance, etc).

In any case, the proposal still keeps an old-fashioned CRL around to check.

Later on, Langley seems to want to replace the CRL with a positive proof of freshness:

http://www.imperialviolet.org/2011/11/29/certtransparency.html

This is a better approach, but it remains to be seen how he intends to organize the whole thing. From the description it already seems strictly weaker than the decentralised EFF Souvereign Key approach.

Many things coming from Google make quite a lot of sense if one is jumping off the cliff and considers everything that Google knows about oneself as "private" and everything that Google knows about everyone else as "the majority view" (in the sense of a P2P network). As any clever lie, this is partially true. Google is good at protecting the data it is collecting, and it has a wide network of servers that is hard to attack by enclosing. But the risk of abuse grows with the value of the data and the number of people who can access it, and this should give pause for thought.

(We've known this prediction since forever, 1998 is when I first heard it.)

We now have a few solid data points where all vendors decided not to
rely on CAs revocation and instead issued new software. So all vendors
agree.

So, if this is the case - revocation delivers no benefit - then rip the
bloody stuff out and make the browser faster and more reliable:

Thanks,
Marcus
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to