I think maybe the problem might be the following statement:
>Every CA instance has a corresponding CRL and Manifest. The CRL contains
>certificates which are revoked and the Manifest contains just Signed
>Objects.
The manifest contains every signed object (except itself) that the CS
produces. That includes subsidiary certs, CRLS, ROAs and any other signed
object. So the certs a CA issues are also the set of "signed objects" the
manifest lists.
You are probably confused by RFC6486:
fileList:
This field is a sequence of FileAndHash objects. There is one
FileAndHash entry for each currently valid signed object that has
been published by the authority (at this publication point).
And the fact that there's an RFC called "Signed Object Template …" (RFC 6488)
which is currently used to define manifests and ROAs.
In RFC6486, "signed objects" means objects that have signatures related to the
CA and are published by the CA, That includes certs and CRLs.
But in RFC 6488, "signed objects" means a subset of those objects, those that
are not subsidiary CA certificates or CRLs..
--Sandy
________________________________________
From: sidr [[email protected]] on behalf of Demian Rosenkranz
[[email protected]]
Sent: Monday, March 03, 2014 11:08 AM
To: [email protected]
Subject: [sidr] Man-in-the-middle attack
Hello,
I have a question regarding the possibility of using mitm attacks to
change repository contents/the validity of signed objects and router
certificates.
Every CA instance has a corresponding CRL and Manifest. The CRL contains
certificates which are revoked and the Manifest contains just Signed
Objects.
Because of the rsync protocol, a mitm attack between RP and repository
is possible. If the attacker withholds ...
... a signed object, the rp software would recognize it by checking the
manifest.
... a EE certificate, the rp software would recognize it, because the
corresponding signed object can't be validated.
... a manifest/crl, the rp sofware would recognize it, because every CA
instance has to have a manifest and a crl.
... a CA certificate and all files underneath that certificate, the rp
software WOULDN'T recognize anything. So the whole structure underneath
that certificate would be invalid.
... a Router certificate, the RP WOULDN'T recognize it, because it isn't
listet in any other file.
Regonize means recognizing the missing file, not necessarily the attack.
It could also be a mistake/bug/etc.
Are the described cases right or did I miss something? Would be great to
get feedback.
Kind regards
Demian Rosenkranz
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr