Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Posted Mar 24, 2015 8:49 UTC (Tue) by marcH (subscriber, #57642)In reply to: Google: Maintaining digital certificate security by ttonino
Parent article: Google: Maintaining digital certificate security
It's not broken; it's only "centralized". As in: the nearest to the center you are, the easier you can spy.
Posted Mar 24, 2015 9:01 UTC (Tue)
by ttonino (guest, #4073)
[Link] (7 responses)
Posted Mar 24, 2015 16:57 UTC (Tue)
by jeff_marshall (subscriber, #49255)
[Link] (6 responses)
While DANE isn't perfect, at least it reduces the number of potential points of failure for any given domain (Verisign for .com + whoever you put in your TLSA record). IMO, it would definitely be an improvement if any old cc-based CA couldn't successfully convince my browser that the certificate it just signed was valid.
Posted Mar 25, 2015 12:36 UTC (Wed)
by gerv (guest, #3376)
[Link] (5 responses)
They are if you deploy HPKP, which was invented precisely to give sites an opt-in way to avoid this problem.
Gerv
Posted Mar 25, 2015 14:50 UTC (Wed)
by cesarb (subscriber, #6266)
[Link] (4 responses)
Posted Mar 25, 2015 15:33 UTC (Wed)
by gerv (guest, #3376)
[Link] (3 responses)
Gerv
Posted Mar 25, 2015 16:24 UTC (Wed)
by josh (subscriber, #17465)
[Link]
Posted Mar 25, 2015 21:05 UTC (Wed)
by cesarb (subscriber, #6266)
[Link] (1 responses)
That's not a strong argument.
First, if my home connection (or work connection) is persistently MITM'ed, and I always (or almost always) use it, it's likely that both the first visit and all subsequent visits to any site will be MITM'ed.
Second, let's take a real example: online banking. The first time I ever connect to it, I set up the online password by using the ATM password. The online banking website asks for the ATM password as an extra verification when doing important transactions. That is, the first time I connect to that online banking website is precisely when I need the most for it to NOT be MITM'ed.
Sure, HPKP can remove a lot of the risk in many situations (nomadic devices, MITM starting after you've already visited the site, etc), but there are several situations in which it doesn't help.
Posted Mar 25, 2015 21:34 UTC (Wed)
by dlang (guest, #313)
[Link]
There are a lot of cases where something like this does help, and if it can be coupled with something like the ssh key update things so that planned migrations from one key to another don't generate noise for users, there would be a lot of value in it.
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Since trust-roots aren't restricted to the domains over which they should have authority
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security
Google: Maintaining digital certificate security