[cryptography] Another CA hacked, it seems.

2011-12-08 Thread Ralph Holz
As I said, at this rate we shall have statistically meaningful large numbers of CA hacks by 2013: http://translate.google.com/translate?sl=autotl=enjs=nprev=_thl=enie=UTF-8layout=2eotf=1u=http%3A%2F%2Fwebwereld.nl%2Fnieuws%2F108815%2Fweer-certificatenleverancier-overheid-gehackt.htmlact=url

Re: [cryptography] Another CA hacked, it seems.

2011-12-08 Thread Adam Back
Did they successfully hack the CA functionality or just a web site housing network design documents for various dutch government entities? From what survives google translate of the original dutch it appears to be the latter no? And if Kerckhoff's principle was followed what does it matter if

[cryptography] airgaps in CAs

2011-12-08 Thread Eugen Leitl
Is anyone aware of a CA that actually maintains its signing secrets on secured, airgapped machines, with transfers batched and done purely by sneakernet? -- Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org __ ICBM:

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread Darren J Moffat
On 12/07/11 14:42, William Whyte wrote: Well, I think the theoretically correct answer is that you *should*... these days all the installers can be available online, after all. Except when the installer CD you need is the one for the network driver on the new machine without which you can't

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread Marsh Ray
On 12/08/2011 09:16 AM, Darren J Moffat wrote: On 12/07/11 14:42, William Whyte wrote: Well, I think the theoretically correct answer is that you *should*... these days all the installers can be available online, after all. Except when the installer CD you need is the one for the network

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread Jeffrey Walton
2011/12/7 Marsh Ray ma...@extendedsubset.com: On 12/07/2011 07:01 PM, lodewijk andré de la porte wrote: I figured it'd be effective to create a security awareness group figuring the most prominent (and only effective) way to show people security is a priority is by placing a simple marking,

Re: [cryptography] airgaps in CAs

2011-12-08 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/08/2011 09:54 AM, Eugen Leitl wrote: Is anyone aware of a CA that actually maintains its signing secrets on secured, airgapped machines, with transfers batched and done purely by sneakernet? Only for one company that went out of business in

Re: [cryptography] Another CA hacked, it seems.

2011-12-08 Thread Ralph Holz
Hi, Did they successfully hack the CA functionality or just a web site housing network design documents for various dutch government entities? From what survives google translate of the original dutch it appears to be the latter no? Too early for a definite call. But there is also this

Re: [cryptography] airgaps in CAs

2011-12-08 Thread Arshad Noor
I am aware of at least one public CA - still in business - that fits this description. Every private PKI we have setup since 1999 (more than a dozen, of which a few were for the largest companies in the world) has had the Root CA on a non-networked machine with commensurate controls to protect

[cryptography] OpenDNS

2011-12-08 Thread jd.cypherpunks
David Ulevitch is rolling out OpenDNS http://david.ulevitch.com/ What do you think? --Michael ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread mhey...@gmail.com
On Wed, Dec 7, 2011 at 4:32 PM, Peter Gutmann pgut...@cs.auckland.ac.nz wrote: In the presence of such a [self-revoking] revocation [of a root certificate] applications can react in one of three ways: they can accept the CRL that revokes the certificate as valid and revoke it, they can reject

Re: [cryptography] OpenDNS

2011-12-08 Thread Marsh Ray
On 12/08/2011 01:09 PM, jd.cypherpunks wrote: David Ulevitch is rolling out OpenDNS http://david.ulevitch.com/ What do you think? I assume you're talking about their new DNSCrypt application. They seem to be saying it's an implementation of DJB's DNSCurve protocol.

Re: [cryptography] OpenDNS

2011-12-08 Thread Randall Webmail
From: jd.cypherpunks jd.cypherpu...@gmail.com David Ulevitch is rolling out OpenDNS http://david.ulevitch.com/ What do you think? He's been running https://www.opendns.com/ for quite some time. I read somewhere that the project is making $200K a month by selling the redirects, but a) That

Re: [cryptography] Another CA hacked, it seems.

2011-12-08 Thread Peter Gutmann
Ralph Holz h...@net.in.tum.de writes: As I said, at this rate we shall have statistically meaningful large numbers of CA hacks by 2013: KPN is claiming there's nothing to worry about, please move along:

Re: [cryptography] airgaps in CAs

2011-12-08 Thread Peter Gutmann
Arshad Noor arshad.n...@strongauth.com writes: Every private PKI we have setup since 1999 (more than a dozen, of which a few were for the largest companies in the world) has had the Root CA on a non-networked machine with commensurate controls to protect the CA. What about TSAs, where you need

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread dan
Peter Gutmann writes: -+--- | This means that once a particular signed binary has been detected | as being malware the virus scanner can extract the signing | certificate and know that anything else that contains that | particular certificate will also be malware, with the

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread Peter Gutmann
d...@geer.org writes: One would assume that the effort to get such a signing certificate would persuade the bad team to use that cert for targeted attacks, not broadcast ones, in which case you would be damned lucky to find it in a place where you could then encapsulate it in a signature-based