This assumes the use of a software RNG that can be open sourced. Many
CAs may be using a hardware source of randomness, such as a HSM, which
runs proprietary code they do not hold the license to.

On 04/30/2016 06:45 AM, Eric Mill wrote:
> On Fri, Apr 29, 2016 at 8:12 PM, Peter Bowen <[email protected]> wrote:
> 
>> On Fri, Apr 29, 2016 at 5:03 PM, Matt Palmer <[email protected]> wrote:
>>> On Fri, Apr 29, 2016 at 12:42:28AM -0700, Nick Lamb wrote:
>>>> There is an absolutely objective test, but it is negative. If anyone can
>>>> predict N-bits of your next serial number then those N-bits were by
>>>> definition predictable.  To give a concrete example if you issued with
>> 16
>>>> digit serial numbers, but the first 8 are YYYYMMDD from the actual date,
>>>> any bad guy can predict those numbers in the next certificate, thus they
>>>> don't constitute entropy / unpredictable bits, so your serial numbers
>> have
>>>> no more than 8 digits of entropy in this scenario.
>>>
>>> Even more fun: what if the serial number is MD5(YYYYMMDDHHmmss)?  In that
>>> case, comparing two serial numbers makes them all *look* awesomely
>> random,
>>> until someone figures out "the secret", at which point pretty much all
>> the
>>> bits are predictable, even though there's no "obvious" pattern from
>>> examining the serials themselves.
>>
>> What if the serial number is HMAC-MD5(SecretStaticKey,
>> YYYYMMDDHHmmss)? Or AES encryption of the timestamp?
>>
>> This is why there are human auditors.  They can ask the CA how they
>> are generating the serial numbers.  That is the only way that this can
>> every be verified.
>>
> 
> Or a CA could release this part of their infrastructure as open source (or
> at least publicly disclosed), and have the auditor attest that the code
> used in production is the code in public version control. That would make
> it so the community, not just the auditor, could evaluate of the strength
> of the methods the CA uses to manage entropy while being assured that
> they're evaluating the actual production code.
> 
> -- Eric
> 
> 
>>
>> Thanks,
>> Peter
>> _______________________________________________
>> dev-security-policy mailing list
>> [email protected]
>> https://lists.mozilla.org/listinfo/dev-security-policy
>>
> 
> 
> 
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to