On 8/29/23 8:31 AM, Charles Mills wrote:
Just being a security PITA here, but that solution makes the security of their systems subject to whatever safeguards you do or do not put on yours.

Remember, Certificate Authorities can be constrained. E.g. it's possible to create an Enterprise Certificate Authority that can only sign things in the enterprise.example.net domain and nothing outside of it. Thereby significantly limiting exposure to things outside of the enterprise.

If I can extract the CA private key from your PC than it is trivial for me to create a www.chase.com certificate that will be trusted by their browsers without any question, and mount a man-in-the-middle attack on their banking.

I question the veracity of that statement.

I can't tell for sure if you are referring to extracting data (possibly the /public/ key) from communications in flight -or- speaking to the security of the CA and it's ecosystem by breaching the CA for it's signing key directly.

There is little difference in breaching an Enterprise CA's signing key than there is in breaching Verisign's CA signing key. The effective difference is related to security around the key. The concept is the same. Just how many fences do you have to get through.

Thankfully, this can be largely mitigated by leveraging things like a YoubiKey and / or a Trusted Platform Module on the CA system wherein the YoubiKey / TPM / etc. hold the actual signing certificate and the main OS connected to them doesn't have access to and can't get access to the signing key.

This comes down to risk vs reward. One system that must be tightly secured, possibly operated at physical console, vs many people ignoring ~> defeating certificate security warnings on the regular. Which is the lesser of the evils / better security posture?

If you are truly worried about the security of an Enterprise CA signing key, there are commercial solutions that can go a long way towards this. But this is small potatoes to training users to defeat certificate warnings.



Grant. . . .

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to