On 4/15/2014 7:43 AM, nobody wrote:
I just wondered... what is the pull back regarding Convergence to put it in
the webbrowsers by default?

The main issue is who are the notaries? If they're simply reflecting back "Yup, I see this valid CA cert" then they aren't adding a whole lot of value for the amount of risk they introduce, and if they're making their own judgement about the validity of the certificates on some other ground they just become a type of Certificate Authority themselves. Who pays for that infrastructure, and what is their motive?

Firefox and Chrome are both working on implementing "key pinning" (and participating in the standardization process for it) which won't "free us from the CA system" but will at least ameliorate one of the worst aspects which is that any two-bit CA anywhere in the world can issue a certificate for any site, anywhere.

The IETF is working on standardizing "Certificate Transparency", Chrome is implementing it, and at least one CA is participating. This again doesn't free us from the CA system, but it does make the public certificates auditable so that mis-issuance could theoretically be detected.

Or I hack the router you
     use to access the internet... all of the notaries you try to talk to I
redirect to me. I say every site is
     valid regardless if it is or not. How is this more secure?

I haven't looked at the technical details of convergence but presumably it requires a secure connection to the notary or better that the notary responses are signed by the notary. If the communication with the notary is unreliable then it's no help at all.

The main practical problems with convergence are that it introduces a dependency on traffic to a 3rd party which hurts privacy, reliability, and performance. These are similar to the problems we have today with OCSP revocation checking.

-Dan Veditz
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to