On 25/8/2017 9:42 μμ, Ryan Hurst via dev-security-policy wrote:
Dimitris,

I think it is not accurate to characterize this as being outside of the CAs 
controls. Several CAs utilize multiple network perspectives and consensus to 
mitigate these risks. While this is not a total solution it is fairly effective 
if the consensus pool is well thought out.

Ryan

Just to make sure I am not misunderstanding, are you referring to CAs with real-time access to the Full Internet Routing Table that allows them to make routing decisions or something completely different? If it's something different, it would be great if you could provide some information about how this consensus over network perspectives (between different CAs) works today.  There are services that offer routing-status like https://stat.ripe.net/widget/routing-status or https://www.cidr-report.org/as2.0/ but I don't know if they are being used by CAs to minimize the chance of accepting a hijacked address prefix (Matt's example).

Dimitris.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to