On Tuesday, June 20, 2017 at 2:06:00 PM UTC-4, Jonathan Rudenberg wrote:
> > On Jun 20, 2017, at 10:36, mfisch--- via dev-security-policy 
> > <dev-security-policy@lists.mozilla.org> wrote:
> > 
> > On Monday, June 19, 2017 at 7:37:23 PM UTC-4, Matt Palmer wrote:
> >> On Sun, Jun 18, 2017 at 08:17:07AM -0700, troy.fridley--- via 
> >> dev-security-policy wrote:
> >>> If you should find such an issue again in a Cisco owned domain, please
> >>> report it to ps...@cisco.com and we will ensure that prompt and proper
> >>> actions are taken.
> >> 
> >> I don't know, this way seems to have worked Just Fine.
> >> 
> >> - Matt
> > 
> > Does no-one else see the lack of responsible disclosure in this thread 
> > distressing?
> > 
> > Yes, the cert was revoked, and for all you know during the race that was 
> > this public disclosure there could have been compromise. There are APT 
> > actors watching this thread right now looking for opportunities.
> 
> The disclosure looks responsible to me.
> 
> The domain resolves to 127.0.0.1, which means that the private key can only 
> be effectively leveraged by a privileged attacker that can forge DNS 
> responses. An attacker that can do this can almost certainly also block 
> online OCSP/CRL checks, preventing the revocation from being seen by clients. 
> In general, revocation will not have any meaningful impact against misuse 
> unless the certificate is included in OneCRL/CRLSets (for Firefox/Chrome).
> 
> Jonathan

Koen,
  Cheers on the find and thanks for your contribution.

Jonathan,

  Is your argument that TLS checking on session key disclosure is not necessary 
because man in the middle is game over?

  You're right there are only very limited ways this sort of thing can be used 
(and maybe it can't be used at all). But it would be difficult to argue 
effectively that:

a) It can't be used under specific circumstances to weaken security and 
possibly combine with other attacks.

b) That someone who recognized this for what it was did not reasonably believe 
it _shouldn't_ be public knowledge.

c) I acknowledge your point about the effectiveness of revocation.

My issue is not in fact with the disclosure at all, but the fact that noone 
else on this thread pointed out that it is not the ideal disclosure methodology 
(at least in order of events). It's now been said.

Both Cisco and the CA maintain infosec incident handling teams that are paid 
specifically to handle these situations. Yes its true corporate infosec fails a 
lot too, but a head start is ethical.

The culture of our industry needs to think hard about the power it wields so it 
is not taken from us and wrapped up in ineffective and burdensome state 
oversight.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to