Re: What is the security benefit of certificate transparency?

2015-04-14 Thread Matt Palmer
On Tue, Apr 14, 2015 at 07:51:24AM -0500, Peter Kurrasch wrote: > So, to paraphrase, the security benefit to CT is on par with posting speed > limits along a highway: if you're going to break the rules, don't get > caught. I think that's a very bad analogy. The way the *entire* world works is "if

Re: Requirements for CNNIC re-application

2015-04-14 Thread Matt Palmer
On Tue, Apr 14, 2015 at 01:38:55PM +0200, Kurt Roeckx wrote: > On 2015-04-14 01:15, Peter Kurrasch wrote: > >Let's use an example. Suppose CNNIC issues a cert for whitehouse[dot]gov and > >let's further suppose that CNNIC includes this cert in the CT data since > >they have agreed to do that. Wha

Re: What is the security benefit of certificate transparency?

2015-04-14 Thread Peter Kurrasch
‎So basically we have: if you mis-issue an end-entity cert and don't update the CT logs, the cert won't work; mis-issue the cert and update the logs with the mis-issuance and everything works just fine. As you say, someone might notice it and say something but there is also a chance that nobody

Re: Propose Removal of E-Guven root

2015-04-14 Thread yuhongbao_386
On Thursday, March 19, 2015 at 1:02:06 PM UTC-7, Peter Bowen wrote: > On Wed, Mar 18, 2015 at 12:40 PM, Kathleen Wilson wrote: > > I propose removing the following root cert from NSS, due to inadequate audit > > statements. > > > > Issuer: > > CN = e-Guven Kok Elektronik Sertifika Hizmet Saglayici

Re: What is the security benefit of certificate transparency?

2015-04-14 Thread Peter Kurrasch
I'm not sure I agree with this metaphor because someone still will review the speed camera data and pass judgment. Who will be doing that for CT? The other problem is that in a speed camera situation there is a documented procedure for dealing with violators.  Has anyone made a public commitmen

CAA (was Re: Requirements for CNNIC re-application)

2015-04-14 Thread Rob Stradling
On 14/04/15 13:09, Kurt Roeckx wrote: On 2015-04-14 13:54, Rob Stradling wrote: On 14/04/15 12:38, Kurt Roeckx wrote: On 2015-04-14 01:15, Peter Kurrasch wrote: Let's use an example. Suppose CNNIC issues a cert for whitehouse[dot]gov and let's further suppose that CNNIC includes this cert in t

Re: What is the security benefit of certificate transparency?

2015-04-14 Thread Phillip Hallam-Baker
I am coming to the conclusion that 'Why fix X when the attacker can do Y so lets not bother with X' is the worst form of security argument. No security control is a magic bullet. Expecting the control that addresses X to also address Y is unreasonable. It is an excuse for inaction. CT is merely o

Re: What is the security benefit of certificate transparency?

2015-04-14 Thread Rob Stradling
Peter, CT is a detection mechanism, so I'd say it's more like a speed camera than a speed limit. If a speed camera catches you speeding, then it's done its job. If the relevant authorities decide to let you off the hook, that doesn't mean that the speed camera was ineffective! On 14/04/15 13

Re: Requirements for CNNIC re-application

2015-04-14 Thread Gervase Markham
On 14/04/15 00:15, Peter Kurrasch wrote: > Let's use an example. Suppose CNNIC issues a cert for > whitehouse[dot]gov presumably without permission ;-)... > and let's further suppose that CNNIC includes this > cert in the CT data since they have agreed to do that. What happens > next? If no

What is the security benefit of certificate transparency?

2015-04-14 Thread Peter Kurrasch
Breaking this part of the discussion out of the CNNIC thread So, to paraphrase, the security benefit to CT is on par with posting speed limits along a highway: if you're going to break the rules, don't get caught. And if you do get caught, have a good excuse--although in the case of CT there

Re: Requirements for CNNIC re-application

2015-04-14 Thread Gervase Markham
On 14/04/15 01:19, Matt Palmer wrote: > I'm not a fan of browser-imposed name constraints on CAs, at a philosophical > level. An important principle of the Mozilla root program, IMO, is that it > works for the public good (insofar as "the public" is represented by "users > of Mozilla products").

Re: Requirements for CNNIC re-application

2015-04-14 Thread Kurt Roeckx
On 2015-04-14 13:54, Rob Stradling wrote: On 14/04/15 12:38, Kurt Roeckx wrote: On 2015-04-14 01:15, Peter Kurrasch wrote: Let's use an example. Suppose CNNIC issues a cert for whitehouse[dot]gov and let's further suppose that CNNIC includes this cert in the CT data since they have agreed to do

Re: Requirements for CNNIC re-application

2015-04-14 Thread Rob Stradling
On 14/04/15 12:38, Kurt Roeckx wrote: On 2015-04-14 01:15, Peter Kurrasch wrote: Let's use an example. Suppose CNNIC issues a cert for whitehouse[dot]gov and let's further suppose that CNNIC includes this cert in the CT data since they have agreed to do that. What happens next? What I've been

Re: Requirements for CNNIC re-application

2015-04-14 Thread Kurt Roeckx
On 2015-04-14 01:15, Peter Kurrasch wrote: Let's use an example. Suppose CNNIC issues a cert for whitehouse[dot]gov and let's further suppose that CNNIC includes this cert in the CT data since they have agreed to do that. What happens next? What I've been wondering about is whether we need a