On 1/3/14, 12:37 PM, "Ralph Holz" <h...@net.in.tum.de> wrote:

>Hi,
>
>>> Alternatively, pull the root cert from which MD5 signatures were
>>>issued.
>>> As the MD5 attack still had considerable cost (for the hobby blackhat,
>>> not a 3-letter agency), it was deemed that this must suffice for a
>>>while.
>> 
>> To make the discussion CT-compliant, having logs provide a list of
>> algorithms that are used by each CA would be a nice feature to enable
>> decisions like this.
>
>Although, in the case you mention, that would not help all that much.
>Fortunately, the days of MD5 in X.509 are over.

I imagine other algorithms will see a similar fate at some point.

>
>But in fact, I've been thinking for a while that an additional
>monitoring infrastructure would be a nice-to-have thing in addition to
>CT --- and, FWIW, also TACK --- I view both drafts as naturally
>complementing each other.

Yes, better monitoring tools would be very helpful.

>
>CT, for example, is not meant to address the issue of whether
>certificates have been deployed correctly (e.g. correct host). I think
>active scans are still worthwhile to collect such information.

Identifying types of metrics that are useful to draw from a CT collections
seems like a worthwhile exercise.  Improved awareness of how a CA is used
sits under many suggestions, such as yours above to remove root CAs that
have used MD5.   

>
>Ralph
>
>-- 
>Ralph Holz
>I8 - Network Architectures and Services
>Technische Universität München
>http://www.net.in.tum.de/de/mitarbeiter/holz/
>Phone +49.89.289.18043
>PGP: A805 D19C E23E 6BBB E0C4  86DC 520E 0C83 69B0 03EF
>_______________________________________________
>therightkey mailing list
>therightkey@ietf.org
>https://www.ietf.org/mailman/listinfo/therightkey


_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to