Hi Rob,

I don’t have any opinion on the other questions, but for:

 

> Should it be enabled or disabled by default?

 

For better or worse, it is not uncommon to install linting software on the same 
host as the CA system itself. In fact, that is how one popular CA software 
suite invokes external linters: it expects a CLI tool to be installed locally 
to perform linting. Having a linter running on the CA host dial out to the 
wider Internet is not a good idea given the security-sensitive nature of the 
host and the software it is running. For this reason, I think this lint should 
be disabled by default.

 

A secondary concern is that external API calls are harder to reason about in 
terms of performance impact due to variability in API response times.

 

Thanks,

Corey

 

From: 'Rob Stradling' via [email protected] 
<[email protected]> 
Sent: Tuesday, October 22, 2024 12:22 PM
To: Matt Palmer <[email protected]>; [email protected]
Subject: Re: Standard PKC Test Keys

 

Inspired by this thread, I've been integrating the pwnedkeys API 
<https://pwnedkeys.com/api/v1>  into pkimetal 
<https://github.com/pkimetal/pkimetal> .  PR at 
https://github.com/pkimetal/pkimetal/pull/183.

 

Whereas all of the other linting tools (including Hanno's badkeys 
<https://github.com/badkeys/badkeys> ) that are already integrated with 
pkimetal are enabled by default and deployed locally (in the same Docker 
container that pkimetal runs from), pwnedkeys is only available as an 
externally-operated API; so I'm wondering what the most appropriate default 
configuration should be for pkimetal's pwnedkeys integration:

*       Should it be enabled or disabled by default?

*       What's a sensible default HTTP request timeout when calling the 
pwnedkeys API?

*       What's a sensible default severity level (error, warning, notice, info) 
if a pwnedkeys API request times out?

*       What's a sensible default severity level if the pwnedkeys API call 
misbehaves in any other way?

*       What's a sensible default maximum number of concurrent requests from a 
pkimetal instance to the pwnedkeys API?

*       Should a pkimetal instance apply a req/sec rate limit on its own 
outgoing requests to the pwnedkeys API?

I'm keen to hear from Matt, but also from any pkimetal users or potential users.

 

  _____  

From:  <mailto:[email protected]> [email protected] 
< <mailto:[email protected]> [email protected]> on 
behalf of Matt Palmer < <mailto:[email protected]> [email protected]>
Sent: 21 October 2024 10:28
To:  <mailto:[email protected]> [email protected] < 
<mailto:[email protected]> [email protected]>
Subject: Re: Standard PKC Test Keys 

 

CAUTION: This email originated from outside of the organization. Do not click 
links or open attachments unless you recognize the sender and know the content 
is safe.


On Mon, Oct 21, 2024 at 08:25:23AM +0000, Peter Gutmann wrote:
> Matt Palmer < <mailto:[email protected]> [email protected]> writes:
> >I have concerns around doing so, as the data set is very large, and
> >constantly updating.
>
> Ah, I didn't realise it was that big, I thought it'd be a small collection
> that could be turned into a bloom filter.

Rather, it's a *large* collection that could be turned into a bloom
filter, instead.  :grin:  Last time I ran the numbers, from memory I
think I calculated I'd need a 32MB filter file to get the false-positive
rate down to 0.1%.

> If there's that many of them the
> data would be interesting, any chance of publishing stats, how many
> compromised keys, how many are X.509, how many are SSH, etc?

There's roughly 2M keys in the pwnedkeys dataset at present.  Splitting
by type can *kinda* be done, insofar as I keep track of whether the
format of the key I found was PKCS1, PKCS8, OpenSSH, PuTTY, etc, but
that's not definitive, since OpenSSH reads other formats of key, and
they're all just big numbers anyway, at the end of the day.

Publishing live stats is doable, just yet another of those "round tuit" things.

> >While I'm sure there are *some* things that can't make arbitrary requests,
> >I'm less confident about the "lots" part.
>
> I'm referring to embedded systems, which have no internet access but end up
> seeing keys from who-knows-where.

The trick there is two-fold: having the storage to hold the dataset, and
managing to somehow maintain a reasonably up-to-date dataset to query --
because new keys get added to the dataset all the time.

> That would be another reason to see what's present, although that could also
> be handled in the stats without having to publish actual keys/certs, what are
> the top identifiers used with non-private keys?  That could be applied like a
> top-ten bad passwords filter, if you can get people to stay away from the most
> commonly-used insecure keys it's at least some progress.

It'd be possible to identify keys that are published in a number of
different places (I keep track of where keys were found, so I could
group key metadata by the SPKI and count how many distinct URLs I find).
I'll add it to the round tuit bucket, too.

- Matt

--
You received this message because you are subscribed to the Google Groups " 
<mailto:[email protected]> [email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to  <mailto:[email protected]> 
[email protected].
To view this discussion on the web visit  
<https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/241411f9-ff14-4d5a-b1d3-7bf7206cf816%40mtasv.net>
 
https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google.com%2Fa%2Fmozilla.org%2Fd%2Fmsgid%2Fdev-security-policy%2F241411f9-ff14-4d5a-b1d3-7bf7206cf816%2540mtasv.net&data=05%7C02%7Crob%40sectigo.com%7Ca2f42a72fe504937140108dcf1b2c319%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638650997301375698%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=O6eiO0SHroRuS0IE0xN8t4oeDRc%2FILqD7OyGdRQ0Cgw%3D&reserved=0.

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected] <mailto:[email protected]> " 
group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected] 
<mailto:[email protected]> .
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/MW4PR17MB4729D5B085D8F19F74F244EFAA4C2%40MW4PR17MB4729.namprd17.prod.outlook.com
 
<https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/MW4PR17MB4729D5B085D8F19F74F244EFAA4C2%40MW4PR17MB4729.namprd17.prod.outlook.com?utm_medium=email&utm_source=footer>
 .

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/DS0PR14MB6216C62DF632863337641A7E924C2%40DS0PR14MB6216.namprd14.prod.outlook.com.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to