Eddy Nigg (StartCom Ltd.) wrote:
> A certificate with a lifetime of one year isn't an *ongoing threat of 
> possibly ten years* to come. There is a huge difference!
> 
> Supposed that a domain which was owned by someone else, isn't going to 
> end up within a very short time in the hands of a different owner, nor 
> that a sensitive web site (as for example with the startssl.com domain 
> name) which would prove to be a worthy candidate for such an attack, is 
> setup within a very short time, it is reasonable to assume that the 
> limitation of a certificate to a life time to one year will sufficiently 
> protect and prevent a MITM attack on said web site.

I don't disagree that in general CAs should limit cert lifetimes, for 
all sort of reasons. However I'm going to disagree with you here about 
the risk assessment. I think an argument from economics is more 
appropriate here:

In the attack you're describing the attacker is basically betting on the
possibility that a given domain name registered today (say, "foo.com") 
will be used by someone in the future. At that future time the attacker 
can do some DNS spoofing to redirect "foo.com" to his own site, which 
has a still-valid DV cert for "foo.com", issued to the attacker at some 
point in the past when the attacker controlled the domain. Thus the MITM 
protections of the DV scheme fail and the attacker is free to commit fraud.

The price of the bet is the cost of registering the domain "foo.com" and 
getting a DV certificate for it. (There might be other costs as well, 
but for the purposes of this argument we can ignore them, since they 
won't change the overall result.) The expected gain from the bet is the 
typical amount realizable from attacking a real foo.com site, multiplied 
by the probability that the "foo.com" domain name will be reused. The 
expected profit is then the expected gain minus the cost.

For example, suppose that the cost of the "foo.com" domain and a 1-year 
DV certificate for it is $30, and there's a 0.1% (0.001) probability 
that "foo.com" will be reused by someone else during the validity period 
of the certificate, and hence will be attackable in the manner 
described. If the amount realizable from an attack against "foo.com" is 
$50,000, then the expected gain from betting on "foo.com" ahead of time 
will be $50 ($50,000 times 0.001). The expected profit is then $20 ($50 
minus $30).

How does this analysis change if the cert has a longer validity period? 
Clearly the probability of the domain "foo.com" being reused increases, 
and hence the expected gain. (For example, we can assume as a first 
approximation that the probability of "foo.com" being reused over a 
10-year period is ten times the probability of it being reused in the 
first year.) However the cost also increases (since 10-year certs cost 
more than 1-year certs), and roughly in the same proportion. Thus the 
expected profit associated using a 10-year certificate for this attack 
is not significantly different than the expected profit from using a 
1-year cert. Since it's the expected profit that determines the risk of 
attack (the higher the expected profit, the higher the risk),

(Note that the above is an oversimplification. For one thing, 10-year 
certs are typically sold at a discounted per-year price; e.g., a 10-year 
cert might only be 7 times the price of a 1-year cert rather than 10 
times that price. However at the same time, from the attacker's point of 
view a gain received 5 or 10 years from now is worth less than a gain 
received in the next year, and so the expected gain has to be discounted 
appropriately as well. Without doing the detailed math I expect that 
these two effects will roughly cancel out, and the expected profit in 
present value terms will still be roughly the same.)

> My argument is with reasons and within accepted boundaries of domain 
> validated certificates. Again, certificates with somewhat longer 
> validity should be handled accordingly (with additional validations 
> perhaps), but since domain validation is already the *lowest barrier* of 
> entry, they should be controlled accordingly with a *reasonable limited 
> validity*. Ten years is NOT reasonable! It borders on intent and gross 
> negligence!

As I wrote above, I think there are good reasons for limiting the 
lifetime of certificates (DV or otherwise), and there are also other 
mechanisms by which CAs could offer multi-year discounts (for example, 
they could have subscribers pay up front for, say, a 10-year cert, and 
then issue 1-year certs renewable without charge for the next nine years).

However as I've noted previously we don't specifically address cert 
lifetimes in our current policy, and given the economics I'm not 
convinced longer cert lifetimes in and of themselves drive up risk, at 
least in terms of your proposed attack scenario.

Frank

-- 
Frank Hecker
[EMAIL PROTECTED]
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to