On Thu, Mar 1, 2018 at 10:31 AM, Nick Lamb via dev-security-policy <
[email protected]> wrote:

> On Thu, 1 Mar 2018 10:51:04 +0000
> Ben Laurie via dev-security-policy
> <[email protected]> wrote:
>
> > Seems to me that signing something that has nothing to do with certs
> > is a safer option - e.g. sign random string+Subject DN.
>
> That does sounds sane, I confess I have not spent much time playing with
> easily available tools to check what is or is not easily possible on
> each platform in terms of producing and checking such proofs. I knew
> that you can make a CSR on popular platforms, and I knew how to check a
> CSR is valid and a bogus CSR seemed obviously harmless to me.
>
> I feel sure I saw someone's carefully thought through procedure for
> proving control over a private key written up properly for close to
> this sort of situation but I have tried and failed to find it again
> since the incident was first reported, and apparently Jeremy didn't
> know it either.


Perhaps you were thinking about the ROBOT attack, which covered
https://robotattack.org/

You can produce such messages, if you have the key, through something like
(note: haven't tested, but you get the idea)

associated_spki_hash=`openssl pkey -inform PEM -in foo.key -pubout |
openssl dgst -sha256 -binary | openssl enc -base64`
associated_crt_sh_url="http://crt.sh/?spkisha256=${associated_spki_hash}";
echo "${associated_crt_sh_url} is compromised - 2018-03-01" > message.txt
openssl dgst -sha256 -sign foo.key -out foo.key -out
${associated_spki_hash}.signature message.txt

to verify
openssl dgst -sha256 -verify <(openssl x509 -in "cert file goes here"
-pubkey -noout) -signature ${associated_spki_hash}.signature message.txt
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to