On Mon, 29 Feb 2016 10:18:01 +0100
Jürgen Brauckmann <[email protected]> wrote:

> Using private PKIs for such stuff isn't risk-free, as software
> vendors are confused about the security properties of their root
> store.

Actually I also thought while reading this thread that I disagree that
a private PKI is always a good idea.
I generally recommend the opposite. Running a private PKI requires
quite a bit of knowledge about certificates and the deployment of roots
and can introduce severe risks if you don't take care of your private
keys.

You avoid all questions about how to deploy it to a diverse device base
if you use publicly trusted roots.

The problem here imho was a different one: If you deploy devices that
you expect to stay around for a longer timeframe always make sure they
implement the most modern protocols available.
Pretty much *all* SHA1-hassle could've been avoided if people hadn't
deployed sub-standard crypto implementations. SHA2-based certificates
were available since the 90s.

-- 
Hanno Böck
https://hboeck.de/

mail/jabber: [email protected]
GPG: BBB51E42

Attachment: pgpXmlpWewtfi.pgp
Description: OpenPGP digital signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to