My point is that you cannot say CT "effectively destroys the attack value of 
mis-issuance" and then as justification say that you are assuming someone will 
notice. This is the gap I'm talking about: the space between when a 
mis-issuance takes place and when someone notices.

For the sake of argument let's suppose I generate a cert for 
"googlecares[dot]com" and it shows up in the CT logs. What happens next? What 
if I do "googlecares[dot]org" instead? Even if someone notices, what action 
will be taken? As a bad guy I'm going to do whatever I can get away with, so it 
seems I don't have to worry about CT because, as it turns out, I can get away 
with quite a lot.


  Original Message  
From: Chris Palmer
Sent: Monday, June 8, 2015 1:38 PM

On Fri, Jun 5, 2015 at 8:04 AM, Peter Kurrasch <fhw...@gmail.com> wrote:‎
>> Certificate Transparency gets us what we want, I think. CT works
>> globally, and is safer, and significantly changes the trust equation:
>> ‎
>> * Reduces to marginal/effectively destroys the attack value of mis-issuance
>
> Please clarify this statement because, as written, this is plainly not true. 
> The only way to reduce the value is if someone detects the mis-issuance and 
> then takes action to resolve it.

Yes, I am assuming that — it's the foundational and necessary
assumption of any audit system.

The Googles, Facebooks, PayPals, ... of the world care very much about
mis-issuance for their domains. Activists and security experts and
bloggers and reporters are always looking for fun stuff, and are
generally capable of writing shell scripts.

> From what I've seen so far, both are major gaps in CT as a security feature.

What have you seen so far that leads you to believe that? Are there
mis-issuances in the existing CT logs that nobody has called attention
to...?
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to