On Tue, Mar 25, 2014 at 11:23:02PM +0100, Christoph Anton Mitterer wrote:
> On Tue, 2014-03-25 at 18:58 +0100, Bas Wijnen wrote:
> > No, the point is that an attacker is detectable.
> Why should he be?

Because I can store the certificate, go somewhere else, and check if my
stored version is identical to the version that I receive from there.

In that sense, self-signed certificates are actually more safe; they
produce a new warning when the certificate changes.


This is about "let's encrypt every single connection on the web".  We're
talking about people like me.  I have a website with a CAcert
certificate.  I can check that my key as it is stored on my server (in
my house) is the same key that I get when I visit the site from the US
(if there's one place where the NSA should have no problem getting
access it's there).

> Well if one has to assume that they sit "in" the big internet exchange
> points... this already gives them a lot...

If they are in the building and can tap the wire, but not modify the
packets, then an encrypted link is unreadable for them.

> > But if they start to doubt, they can check if they have been attacked,
> > by comparing their keys through an independent channel.
> Well but that simply doesn't happen, does it?

I recently did it, I'm guessing I'm not the only one.

> So people must have your "doubts" by know, but nothing really changes.

I'm talking about posts on Slashdot from people saying "I checked my
certificate from home and from the US, and they were different,
therefore 'someone is doing something naughty'".  I haven't seen any of
those.

> > to convince people that not encrypting is better than encrypting
> > with unchecked keys.
> Well that's not what I said... I rather say the later is simply not
> enough.

Fair enough, you didn't say it was better, but you did disagree with
"it's better to do crypto, even if it's anonymous and you have no idea
who you're talking to".

... which leads to the conclusion that "it's not better to do crypto" in
that situation (which isn't the same as "better not to", but close
enough, I would think).

> Well first... why is an attack only a problem if it's done at large
> scale?

Because the data we're talking about is approximately the definition of
uninteresting.  It's all the connections to people's private websites,
personal chat sessions, that sort of stuff.  The only way it is useful
for them, is when they gather huge amounts of it and filter it.

> If the NSA does this only for the Snowdens, Applebaums, etc. ... then
> this is enough for them...

In that case you can stop worrying.  The NSA has billions of dollars at
their disposal.  If they really want some information, they will get it.
There is no way we can prevent that, and we shouldn't waste our time on
trying.

Expect the NSA to always be able to read everything.  It may not always
be true, but who cares?  We don't have the power to stop them.

What remains, is a mostly unencrypted web.  We should fix that.  The NSA
isn't the only one who wants to listen, and even if we can't stop the
NSA, we can still stop most others.  The only way to do that, is by
making encryption easy and functional.  Dropping CAs from the list is
counterproductive.  Especially with CAcert, which I expect to be
disproportionally popular with Debian users.

> I'm not saying that CAcert is secure or trustworthy (actually I wouldn't
> use it for my own "security critical" services - neither would I use any
> other CA not under my personal control)... but it's not less secure than
> any other CA we ship.

Unless you are really large (like Google or Microsoft), a CA under your
personal control is useless.  The point of a CA is that your visitors
get the root key through an independent trusted channel.  If you need to
send your personal root key to all your visitors, you can as well send
them the key you use for encryption.

> And right now, the only thing we do is taking away the user's
> possibility to retrieve root certificates in a secure way.
> 
> We should not remove certs... we should add more, like CERN CA, TACAR
> TERENA, etc.

On that we agree, then. :-)

Thanks,
Bas

Attachment: signature.asc
Description: Digital signature

Reply via email to