Just thinking out loud here.

On 09/13/2011 01:41 PM, Yoav Nir wrote:

Locking yourself into a CA like that seems like a bad idea. Unlike
the Dutch government and Mozilla, most customers do not have the pull
to force CAs to submit to audits.

Or not, like the Dutch government, have the pull to convince Mozilla to hesitate for a few days to revoke your pwned CA.

Six months ago we would not have thought that Comodo or DigiNotar
were easy to hack. In the latter case, the customers of DigiNotar
were left out in the cold. Without certificate pinning, they just
need to spend money on a new certificate and their site is working
again. With it, they are in trouble.

When would locking yourself into a keypair be any more sensible?

PKI has long history of uncounted thousands of revoked certs, most probably for mundane reasons. But a large number of critical cases are certainly due to the webserver and private key getting pwned (like senate.gov).

What if attacker pwned your web server and configured it to broadcast HSTS for a few days, pinning you to the keypair of which they now know the private key?

What if they maliciously pinned you to a floundering CA?

Google is one thing, they have their own CA and even their own web browser.

Q: What kind of pinning would we recommend to our friend or family member who runs his business on the web?
Right now he has his domain registration and cert from GoDaddy.

- Marsh
_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to