Boris Zbarsky wrote:
Alaric Dailey wrote:
If DNS were secure, then attempts to use a stolen cert would be thwarted.

Not particularly. As someone pointed out, anyone who steals a cert and can affect the routing of your packets can screw you.

Not if we were to strengthen the rules by saying that certs (or certain classes of certs) had to have their fingerprints validated by a DNSSEC-verified DNS record that has the cert fingerprint and was valid for a period of N or fewer days including the present.

That said, I don't think stolen certs are the top problem to be worrying about.

Even so, DNSSEC could provide a simpler replacement (fewer intermediaries) for domain validation certs and other things where domain validation rather than identity validation is important (such as email relaying, and sometimes even user connections to sites whose hostname was established in other reliable ways). It could also (as above) be used as a double-check of the domain validation aspects of other certs, although I'm a little more skeptical of the value there.

-David

--
L. David Baron                                <URL: http://dbaron.org/ >
           Technical Lead, Layout & CSS, Mozilla Corporation
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to