On 15/08/13 13:22 PM, Mikko Rantalainen wrote:
On Thursday, 15 August 2013 12:23:18 UTC+3, Gervase Markham  wrote:
On 14/08/13 07:09, Mikko Rantalainen wrote:

I'd say that such a bookmark would be highly probably safe, if that
bookmark did include fingerprint for the site public key (*not CA key
fingerprint*) and the browser did verify the fingerprint before
entering the site.

Except that the bookmark would break with a scary warning whenever the
site changed its key - i.e. once every two years.

No. The site's public key does not need to be changed to request a new 
certificate. CA signed certificate is technically a digital signature saying 
that given public key signature belongs to a site.


Right. The CA is the authority. Only the authority's changed view needs to be communicated. So if the CA hasn't changed its view, and a new certificate turns up (with or without a new key) then the authority is still stating the same thing: this domain is secured by this key.

(However, the browser declines to show the authority's view, instead showing a 'derivative' view that is really the browser vendor's view. Or, the browser is the authority, in which case, Mozilla is the CA. Pick your model... Either way, these things have all been coded up, got working, etc. Accept no excuses.)


... You can create a new signature without changing the public key. The only 
reason CAs need to renew the signatures in the first place is that they sign 
for limited time for monetary purposes. (Officially CAs claim that the time 
limit is for security purposes but why allow 2 year certs if time limit 
increases security? Why not issue a new signature every day and be done with 
broken revocation lists?)


You'll upset people if you start talking like that :)



iang


_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to