On 8/29/23 2:49 PM, Rick Troth wrote:
When they say "certificates shall only last a year", there's little we can do about it, whether they're right or wrong.

The browser manufacturers have power in the browser ecosystem and the ecosystems that pander to them (*cough* CAs *couth*).

But browser manufacturers have exceedingly little say in how I configure TLS on my email server.

Crypto alone doesn't make your systems secure. Faster refresh does not improve your posture all by itself.

I believe the faster refresh is all about shortening the exposure window.

If the CA is breached, then the issued certs are just as invalid on day one as they are on day 398. In that case, what has the shortened lifetime bought us?

Recent history (last 10-20 years) has demonstrated that not enough people update their system (think software updates, not hardware upgrades) nearly as often as they should.

As such, these people don't get the updates wherein the compromised root cert / public key therein is distrusted / banned.

So, many in the industry are responding by shortening the natural lifetime of such certificates.

Shortening the lifetime of a certificate does shorten the possible amount of time when that given compromised certificate can be used against people that updated to learn to not trust it.

This is not to say that fast cycle advocates are idiots. Most of them are prolly way smarter than I am. It's just that they stopped short of solving the real problem. (And some of them are opportunists: if they can get you to buy their wares in a panic, then they've made a pretty penny and can retire sooner.)

There have been at least three major attempts to convey that certificates should be distrusted before their expiration:

 - Certificate Revocation Lists (CRL)  --  Client checks remote data
 - Online Certificate Status Protocol (OCSP)  --  Client checks remote data
- OCSP Stapling -- Server fetches remote data, hands it to the client, client check verifiable data it was handed.

Sadly, all three of these have left more exposure than people are comfortable with.

So, rather than trying to deal with early distrust of certificates, the Certificate Authority / Browser Forum (CA/B Forum) has decided to tackle things differently by shortening the possible exposure window.

I almost regret this note because I haven't really offered a solution.

Lots of really smart people have put forth multiple solutions. Some were widely deployed. Most were not as successful as many had hoped.

Some say "security is a process". I hate that slogan, but it's kinda true. I DO say that we're foolish to try and shrink-wrap security into store-shelf remedies. There's no alternative to educating the staff.



--
Grant. . . .

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to