On 16/12/12 11:47 AM, Adam Back wrote:
(note the tidy email editing, Ben, and other blind top posters to massive
email threads :)

See inlne.

On Sun, Dec 16, 2012 at 10:52:37AM +0300, ianG wrote:
[...] we want to prove that a certificate found in an MITM was in the
chain
or not.

But (4) we already have that, in a non-cryptographic way.  If we find
a certificate that is apparently signed by say VeriSign root and was
found in an MITM, we can simply publish it with the facts.  Verisign
are then encouraged to disclose (a) it was ours, (b) it wasn't ours,
or (c) mmmmummm...

Verisign cant claim it wasnt theirs because the signing CA it will be
signed
by one of their roots, or a sub-CA thereof.

Just to nitpick on this point, a CA certainly can claim that they or an agent did not sign a certificate. And, they can provide the evidence, and should have the ability to do this: CAs internally have logs as to what they did or did not sign, and this is part of their internal process.

This is because the real world doesn't trust the cryptographic evidence on the face of it, we always need to go back to an independent verification of some form - a further point against Ben's proposal.

As a case in point, the spear phishing attack that occurred a couple of years back is now thought to be a case of attacker-forged certs, with no signing action by the CA. In this case, all of the implicated attacks involved 512 bit RSA signing, suggesting easy solutions.

http://wiki.cacert.org/Risk/History#h2011.4

As I say, just a nitpick - the main point is that we can demand facts and then use those fact to assemble a picture of where the risks lie. Which you admirably show. If the CA declines to play, that's just another fact.

iang

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to