Yo Hal!

On Thu, 28 Mar 2019 16:26:55 -0700
Hal Murray via devel <devel@ntpsec.org> wrote:

> Gary said:
> >> There is a downside. Every time it changes, you have to take
> >> a leap of faith when you re-pin it, rather than getting normal
> >> CA validation.  
> > You miss the point, this is addition to normal CA validation, not an
> > alternative to it.  Just like HPKP.   
> 
> I'm missing something important.  Why would I need additional
> validation? Isn't normal certificate validation good enough?

There have been many cases, some in the last year, where black
hats have tricked CA's into issuing them certs for major domains.
Then the bogus certs used for fraud.  That is why HPKP and DANE
were invented.

Please note, I am not suggesting this will be a problem for ntpd like it
has become a problem for XMPP, smtp, https, etc.  Yet.

One cool thing about HPKP and DANE is that zero user configuration
is required to get the extra security.

Potential extra security is just an added feature that you get for free
once you add certificate pinning to handle the ostfalia case.

Check the pin, but do not check the chain:

    server ostfalie.de noval pin XXXXXXX

Check the pin, and check the chain:

    server rellim.com pin YYYYYY

Now if someone can trick a CA into giving them a valid rellim.com cert
the connection will still be secure.

RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
        g...@rellim.com  Tel:+1 541 382 8588

            Veritas liberabit vos. -- Quid est veritas?
    "If you can’t measure it, you can’t improve it." - Lord Kelvin

Attachment: pgprpKl0_6vk6.pgp
Description: OpenPGP digital signature

_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to