|
|
Subscribe / Log in / New account

Google: Maintaining digital certificate security

Google: Maintaining digital certificate security

Posted Mar 24, 2015 8:49 UTC (Tue) by marcH (subscriber, #57642)
In reply to: Google: Maintaining digital certificate security by ttonino
Parent article: Google: Maintaining digital certificate security

> The CA system is just totally broken.

It's not broken; it's only "centralized". As in: the nearest to the center you are, the easier you can spy.


to post comments

Google: Maintaining digital certificate security

Posted Mar 24, 2015 9:01 UTC (Tue) by ttonino (guest, #4073) [Link] (7 responses)

If only it was centralized. There are way too many CAs. And removing a CA has too much impact on legitimate customers, so CAs are only rarely removed, even if they a make mistake now or then.

Google: Maintaining digital certificate security

Posted Mar 24, 2015 16:57 UTC (Tue) by jeff_marshall (subscriber, #49255) [Link] (6 responses)

Agreed. One of the biggest problems with X.509 is that it was designed to be centralized, but actually has a huge number of trust roots operating independently. Since trust-roots aren't restricted to the domains over which they should have authority, people looking to compromise any given domain can shop for the weakest trust root and compromise/buy-off that one (rather than the CA you actually used).

While DANE isn't perfect, at least it reduces the number of potential points of failure for any given domain (Verisign for .com + whoever you put in your TLSA record). IMO, it would definitely be an improvement if any old cc-based CA couldn't successfully convince my browser that the certificate it just signed was valid.

Google: Maintaining digital certificate security

Posted Mar 25, 2015 12:36 UTC (Wed) by gerv (guest, #3376) [Link] (5 responses)

Since trust-roots aren't restricted to the domains over which they should have authority

They are if you deploy HPKP, which was invented precisely to give sites an opt-in way to avoid this problem.

Gerv

Google: Maintaining digital certificate security

Posted Mar 25, 2015 14:50 UTC (Wed) by cesarb (subscriber, #6266) [Link] (4 responses)

Doesn't HPKP require you to have visited the site at least once before? I wouldn't help if the initial connection was also MITM'ed.

Google: Maintaining digital certificate security

Posted Mar 25, 2015 15:33 UTC (Wed) by gerv (guest, #3376) [Link] (3 responses)

If this is the first time you've ever connected to a site, it's less likely you are going to be doing high value transactions on it. Most web visits are to places people have been before. HPKP is not perfect, clearly, but for sites which adopt it, it mostly removes this risk.

Gerv

Google: Maintaining digital certificate security

Posted Mar 25, 2015 16:24 UTC (Wed) by josh (subscriber, #17465) [Link]

As much as people make fun of QR codes and similar, one of these days, I'd love to see a standard for an easily-scanned barcode that includes not only a URL but the expected public key of that URL. That provides continuity from, for instance, the physical entity of your bank and a secure connection to their website.

Google: Maintaining digital certificate security

Posted Mar 25, 2015 21:05 UTC (Wed) by cesarb (subscriber, #6266) [Link] (1 responses)

> If this is the first time you've ever connected to a site, it's less likely you are going to be doing high value transactions on it. Most web visits are to places people have been before.

That's not a strong argument.

First, if my home connection (or work connection) is persistently MITM'ed, and I always (or almost always) use it, it's likely that both the first visit and all subsequent visits to any site will be MITM'ed.

Second, let's take a real example: online banking. The first time I ever connect to it, I set up the online password by using the ATM password. The online banking website asks for the ATM password as an extra verification when doing important transactions. That is, the first time I connect to that online banking website is precisely when I need the most for it to NOT be MITM'ed.

Sure, HPKP can remove a lot of the risk in many situations (nomadic devices, MITM starting after you've already visited the site, etc), but there are several situations in which it doesn't help.

Google: Maintaining digital certificate security

Posted Mar 25, 2015 21:34 UTC (Wed) by dlang (guest, #313) [Link]

no security is absolute, but if your home system is targeted by a persistent MITM that's after you and faking the sites you connect to, what are the odds against them doing a black-bag job on your system?

There are a lot of cases where something like this does help, and if it can be coupled with something like the ssh key update things so that planned migrations from one key to another don't generate noise for users, there would be a lot of value in it.


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds