I can't see the point of 45 day certs. Either you do a year or you do 7
days. Pointless to do anything in the middle. I prefer to have systems fail
quickly than after the consultant who installed them has disappeared.

The problem we have with TLS security is that the WebPKI was designed to
make it as safe using a credit card online as in a bricks and mortar store.
That is all it was ever built for. It was not built to enable encryption
because the NSA and FBI was making that impossible. Those who were there
remember 40 bit encryption.


The WebPKI is now being used for a large number of things and there are
many it really isn't very good at. Google funded LetsEncrypt as a means of
enabling ubiquitous encryption and preventing ISPs from intercepting Web
pages to replace Google ads with ads from the ISP. And they did it in a way
that broke the controls intended to protect people doing shopping online.

So the net result is that now we have a WebPKI that works fairly well for
any service or device that is reliably connected to the public Internet.
ACME doesn't really work well at the moment for IoT devices belonging to
consumers because consumers don't have the technical skill, the DNS access
etc. required to deploy for a home device. But that is fixable and
something I hope to demonstrate a fix for at the Bangkok IETF next month.

I have a prototype that allows a user with the DNS handle @
phill.hallambaker.com to configure devices and services in their domain. So
I buy a NAS, I scan a QR code on it, give it the name 'nas.hallambaker.com'
and the thing now talks to my network, is reachable as
https://nas.hallambaker.com/ and I can log in with my DNS Handle using my
'@nywhere' account.

That solves almost every use case except the 'what if Internet is out for
more than 7 days and the cert life is limited to 6' and 'what if I lose the
DNS name I am using for my handles'.

My solution to that is to actually configure the device with two sets of
certificates, one under the public WebPKI and nas.hallambaker.com and the
other under a private CA hierarchy as nas.hallambaker.alt. And that is
under my own personal root and with certs that can have long lifespans
because I actually have a functioning revocation system on the local
private CA.

So I can of course install my private root into my browsers. But that is a
bit of a pain for ordinary users and I don't like the idea of them
installing private roots, a bad habit to start.

So imagine we have a CA like LetsEncrypt called LetsAuthenticate.com and it
does two things

1) Reserves names in .alt on a first come first served basis.
2) Issues cross certificates to the party that reserved the name.

That solves the problem of creating a set of names and credentials for the
home to use when it is off-grid and for writing internal scripts that have
to survive a public domain name change.

-- 
You received this message because you are subscribed to the Google Groups 
"dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-security-policy+unsubscr...@mozilla.org.
To view this discussion visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAMm%2BLwg3-r4Kf4kuBw0gnctu7OiFv2w3sXntD-GSK6_t-mjk4Q%40mail.gmail.com.

Reply via email to