Paul Hoffman:
> On Jan 1, 2014, at 10:22 AM, Jacob Appelbaum <ja...@appelbaum.net>
> wrote:
> 
>> I do control the private key for the aforementioned intermediate 
>> certificate[0] authority. :)
> 
> No, you really do not.

I control the private key for the rouge CA that we created. I'm not the
only one with the private key material - all of my fellow researchers
likely still have it as well.

Perhaps you think that I said something that I didn't say. I'm not
claiming that I have the private key for the CA's actual correct CA
signing key.

> As you certainly know, that attack only
> applied to a very limited number of CAs in the root piles at the
> time.

I'm not sure where you came to this impression? There were a few CAs who
were vulnerable, we picked one to perform the research. It worked. That
work produced a valid signature that we could apply to our second
certificate, which is a sub-CA certificate. Thus, the attack we did only
applied to a single CA and we did not destroy the private key for the
corresponding certificate. So yes, we most certainly do have the private
key for that intermediate certificate authority that we created.

> I I remember correctly, it applied to zero of them
> approximately six months later.

Unless one explicitly distrusts (all) MD5 signed certificates, pre-loads
our certificate to mark it as untrusted, or a few other things relating
to time constraints - it will probably still work for MITM attacks. Many
applications fail to do proper constraint checking.

> Please don't overstate the results of
> the excellent research that you did; doing so diminishes the
> research.

I'm not overstating anything. I think you don't understand what we
actually did if you think that later, patching things will somehow
magically stop previously successful attacks...

All the best,
Jacob
_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to