- removed the reference to DKG (it will appear in the Acknowledgements section)

- used "doppelganger" to refer to the bogus EE cert, trying to avoid the
      question of whether there are one or two bogus certs

    - removed reference to X.509 (to make David Cooper happier)

- clarified why revocation by one malicious CA does not cause the doppleganger
      EE cert to be treated as revoked by relying parties

- noted the constraint that the two malicious CAs must not have a common trust anchor

Steve
-----

3.3 Malicious, Colluding CAs

Section 3.2 examined attacks in which a single CA issued a bogus certificate. There is also the potential that two or more CAs might collude to issue a bogus certificate in a fashion designed to foil the remediation safeguards envisioned by CT.

In general, any two CAs that are not name-constrained and do not share a common path to a trust anchor can collude to create a “doppelganger” EE certificate that is bogus. The attack need not be initiated by trust anchors; any subordinate pair of (not name-constrained) CAs can effect this attack without the knowledge of superiors CAs. (Also note that X. RFC 5280 do not preclude creation of doppelganger certificates for either CAs or EEs. Requirements for Subject name uniqueness apply individually to each CA but not across CA boundaries, and there is no requirement for public key uniqueness across CAs.)

The attack requires that each of the colluding CAs issues a certificate for a targeted Subject (e.g., web site). These two (EE) certificates are identical, hence the use of the term “doppelganger”; they contain the same name, public key, serial number, etc. Only one of the malicious CAs logs the bogus certificate and acquires an SCT for it.

The logged bogus certificate can be detected by a Monitor (third party or self), that is watching the log(s) to which the certificate was posted. Thus the detection aspect of CT still works with regard to this certificate. When this certificate is detected, the CA that logged the certificate may choose to revoke it, i.e., place it on a CRL or create an OCSP response for it. However, a browser checking a CRL or OCSP response may not match this revocationstatus data against the doppelganger certificate; revocation status checking is performed in the context of a certificate path and the doppelganger certificates have different certificate paths. Revoking a detected, bogus certificatemay be the best strategy for the malicious CA that logged the certificate; it makes issuance of the bogus certificate appear to be an accident, and thus browser vendors may not feel the need to make an entry on their blacklists for the bogus certificate or the CA that issued it. (If the bogus certificate included an AIA extension providing information for revocation status checking, revocation by the CA that logged the bogus certificate would not be an effective strategy. However, inclusion of this extension is not mandated by RFC 5280. Also the extension is not critical, meaning that relying parties are not required to be able to process it.)

If the CA that logged the bogus certificate fails to revoke it, browser vendors might blacklist the certificate. However, as noted above, the doppelganger, which was not logged, will match the SCT created for the logged certificate. If remediation is effected by blacklisting (instead of revocation by one of the malicious CAs) then the ability of CT to deal with this sort of attack may be diminished. Some forms of blacklisting will cause the not-logged bogus certificate to be detected and rejected, while others will not, depending on the details of the blacklisting mechanism. Mechanisms for blacklisting by browsers are not specified in any IETF standards. The mechanisms are browser-specific, and the choice of how to blacklist (e.g., the bogus certificate vs. the CA that issued it) are the purview of each browser vendor. Thus, depending on the details of the blacklist mechanism and the way that a browser vendor chooses to manage this list, a doppelganger CA attack might or might not pose a problem in terms of successful remediation of the attack.



_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to