Re: [cryptography] airgaps in CAs

2011-12-08 Thread Martin Paljak
On 12/9/11 6:16 , Peter Gutmann wrote: > Arshad Noor writes: > >> Every private PKI we have setup since 1999 (more than a dozen, of which a >> few >> were for the largest companies in the world) has had the Root CA on a >> non-networked machine with commensurate controls to protect the CA. >

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread Peter Gutmann
writes: >One would assume that the effort to get such a signing certificate would >persuade the bad team to use that cert for targeted attacks, not broadcast >ones, in which case you would be damned lucky to find it in a place where you >could then encapsulate it in a signature-based protection

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread dan
Peter Gutmann writes: -+--- | This means that once a particular signed binary has been detected | as being malware the virus scanner can extract the signing | certificate and know that anything else that contains that | particular certificate will also be malware, with the cert

Re: [cryptography] airgaps in CAs

2011-12-08 Thread Peter Gutmann
Arshad Noor writes: >Every private PKI we have setup since 1999 (more than a dozen, of which a few >were for the largest companies in the world) has had the Root CA on a >non-networked machine with commensurate controls to protect the CA. What about TSAs, where you need a key with an irrevocab

Re: [cryptography] Another CA hacked, it seems.

2011-12-08 Thread Peter Gutmann
Ralph Holz writes: >As I said, at this rate we shall have statistically meaningful large >numbers of CA hacks by 2013: KPN is claiming there's nothing to worry about, please move along: http://translate.google.com/translate?hl=en&sl=auto&tl=en&u=http%3A%2F%2Fforum.kpn.com%2Ft5%2FNews-stream%2FU

Re: [cryptography] OpenDNS

2011-12-08 Thread Randall Webmail
From: "jd.cypherpunks" >David Ulevitch is rolling out OpenDNS http://david.ulevitch.com/ What do you think? He's been running https://www.opendns.com/ for quite some time. I read somewhere that the project is making $200K a month by selling the redirects, but a) That seems grossly inflated, an

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread Peter Gutmann
"mhey...@gmail.com" writes: >In a CRL that contains an element that revokes the CRL signing certificate, >only that element can be assumed to be correct. All other list elements are >suspect. Uhh, read my original text again. This is your personal opinion. Ask a bunch of PKI people, or look

Re: [cryptography] OpenDNS

2011-12-08 Thread Marsh Ray
On 12/08/2011 01:09 PM, jd.cypherpunks wrote: David Ulevitch is rolling out OpenDNS http://david.ulevitch.com/ What do you think? I assume you're talking about their new DNSCrypt application. They seem to be saying it's an implementation of DJB's DNSCurve protocol. https://twitter.com/#!/david

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread mhey...@gmail.com
On Wed, Dec 7, 2011 at 4:32 PM, Peter Gutmann wrote: > > In the presence of such a [self-revoking] revocation [of a root certificate] > applications can react in one of three ways: they can accept the CRL > that revokes the certificate as valid and revoke it, they can reject the > CRL as invalid

[cryptography] OpenDNS

2011-12-08 Thread jd.cypherpunks
David Ulevitch is rolling out OpenDNS http://david.ulevitch.com/ What do you think? --Michael ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] airgaps in CAs

2011-12-08 Thread Arshad Noor
I am aware of at least one public CA - still in business - that fits this description. Every private PKI we have setup since 1999 (more than a dozen, of which a few were for the largest companies in the world) has had the Root CA on a non-networked machine with commensurate controls to protect th

Re: [cryptography] Another CA hacked, it seems.

2011-12-08 Thread Ralph Holz
Hi, > Did they successfully hack the CA functionality or just a web site housing > network design documents for various dutch government entities? From what > survives google translate of the original dutch it appears to be the latter > no? Too early for a definite call. But there is also this r

Re: [cryptography] airgaps in CAs

2011-12-08 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/08/2011 09:54 AM, Eugen Leitl wrote: > Is anyone aware of a CA that actually maintains its signing secrets > on secured, airgapped machines, with transfers batched and done > purely by sneakernet? Only for one company that went out of business

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread Jeffrey Walton
2011/12/7 Marsh Ray : > > On 12/07/2011 07:01 PM, lodewijk andré de la porte wrote: >> >> I figured it'd be effective to create a "security awareness group" >> figuring the most prominent (and only effective) way to show people >> security is a priority is by placing a simple marking, something lik

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread Nico Williams
On Thu, Dec 8, 2011 at 9:26 AM, Darren J Moffat wrote: > On 12/08/11 03:27, Nico Williams wrote: >> You misunderstand.  The Android code signing model isn't intended to >> protect you from installing malware: it's intended to help Android a) >> provide isolation between apps from different sources

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread Marsh Ray
On 12/08/2011 09:16 AM, Darren J Moffat wrote: On 12/07/11 14:42, William Whyte wrote: Well, I think the theoretically correct answer is that you *should*... these days all the installers can be available online, after all. Except when the installer CD you need is the one for the network drive

Re: [cryptography] How are expired code-signing certs revoked?

2011-12-08 Thread Darren J Moffat
On 12/07/11 14:42, William Whyte wrote: Well, I think the theoretically correct answer is that you *should*... these days all the installers can be available online, after all. Except when the installer CD you need is the one for the network driver on the new machine without which you can't ge

[cryptography] airgaps in CAs

2011-12-08 Thread Eugen Leitl
Is anyone aware of a CA that actually maintains its signing secrets on secured, airgapped machines, with transfers batched and done purely by sneakernet? -- Eugen* Leitl http://leitl.org";>leitl http://leitl.org __ ICBM: 48.07100, 11.36

Re: [cryptography] Another CA hacked, it seems.

2011-12-08 Thread ianG
On 9/12/11 01:46 AM, Adam Back wrote: I'd hestitate calling that a "CA hacked" even if the web site was a web site belonging to someone who operates a CA. My question is whether the website / database had subscriber information on it. That's a CA hack, albeit more a privacy hack than a cryp

Re: [cryptography] Another CA hacked, it seems.

2011-12-08 Thread Adam Back
Did they successfully hack the CA functionality or just a web site housing network design documents for various dutch government entities? From what survives google translate of the original dutch it appears to be the latter no? And if Kerckhoff's principle was followed what does it matter if so

[cryptography] Another CA hacked, it seems.

2011-12-08 Thread Ralph Holz
As I said, at this rate we shall have statistically meaningful large numbers of CA hacks by 2013: http://translate.google.com/translate?sl=auto&tl=en&js=n&prev=_t&hl=en&ie=UTF-8&layout=2&eotf=1&u=http%3A%2F%2Fwebwereld.nl%2Fnieuws%2F108815%2Fweer-certificatenleverancier-overheid-gehackt.html&act=u

Re: [cryptography] Law of unintended consequences?

2011-12-08 Thread ianG
On 8/12/11 12:01 PM, lodewijk andré de la porte wrote: I figured it'd be effective to create a "security awareness group" figuring the most prominent (and only effective) way to show people security is a priority is by placing a simple marking, something like "this site isn't safe!" and contact