OK, Frank, not going to run in circles here...just a few short 
replies....last try....

Frank Hecker:
> I understand what you're saying, but in the end we have to weight 
> security risks in some way, and using an economic analysis is IMO a 
> reasonable way to do that. To say that you can't put a price on 
> something is in essence to stop discussion and foreclose analysis. We 
> implicitly put a price on stuff like breached privacy and lost trust all 
> the time, by saying that certain measures to protect privacy and 
> maintain trust are worth the investment and others are not. If privacy 
> and trust were truly priceless then we would be obligated to spend as 
> much money as possible to protect them, to the exclusion of any other 
> considerations.
>   
Yes, yes and yes, everything should be *reasonable*!
>   
>> Frank, first of all your argument is lame, because you are talking about 
>> the eventual price of such an attack and apparently you seem to agree 
>> that this attack vector is real and an MITM possible.
>>     
>
> Is it a conceivable attack? Yes. Is it a likely attack? 
I'm not sure, but it's a threat which exist for a very long time in this 
case. This is my problem here. The threat doesn't diminish after a 
*reasonable* amount of time. The same you might ask about MITM attacks 
in general. I can't point to any I know about, but we know it's possible 
and that's why we are all here.

> But I would note that to the extent that "this attack vector is real and 
> an MITM possible", this is the case for any DV certs, even 1-year certs.
>   
Yes, but the threat declines after one year. This is a *reasonable* 
amount of time and something controllable to some extend.

> Strictly speaking I don't need to judge the profit; I just need to judge 
> the probability and the cost. My point is that as the cert lifetime 
> grows longer, the probability of an attack (and thus any expected 
> economic gain from it) increases along with it, but the cost of an 
> attack increases roughly in proportion, since the attacker would need to 
> purchase more expensive certs. 

Until a CA decides to issues such certificate for said period without an 
increase in price - and than what? Which risk assessment is now correct?

> You're correct, the price of a certificate has nothing to do with the 
> function of a CA and how it goes about its business. However the price 
> of a cert is quite relevant to the analysis of potential attacks. To use 
> an extreme example, if obtaining an SSL cert cost at least $100,000 then 
> there probably wouldn't be many attacks in real-life involving attackers 
> purchasing certs. They'd find cheaper ways to attack systems.
>   

LOL

Yes you are right in this respect and I wouldn't worry that much about 
the lifetime of such a certificate :-)

>   
>> Very obviously, a domain name can literally not be used again for any 
>> serious purpose if there is the potential of a valid and legitimate 
>> certificate in the hands of a previous owner (and potential attacker). 
>> Please read this sentence twice, three times load ;-)
>>     
>
> I have indeed read it, now please read this in return :-) As long as 
> domain names can be re-registered to different owners, there is always 
> this potential to some degree. It doesn't matter whether the cert 
> lifetime is 10 years, 1 year, or 1 week. If I purchase a domain name 
> today, it's possible that someone registered this domain a few days ago, 
> got a cert for it, returned the domain name for a refund, and is now 
> ready to attack. Thus if we take your statement literally then the 
> implication is that we should never use a DV cert with any domain 
> whatsoever, period, full stop.
>   

Yes Frank you are right, but I have the feeling that I'm failing to 
bring the correct message over to you...

A threat for the period of one week is something one can take into 
consideration and handle. Even the period of one year of such a threat 
might be *reasonable*. But the same thread for ten years is not. Me, as 
the new domain name owner, can circumvent and plan accordingly if such 
certs are limited to a *reasonable* validity. I can't handle ten years.

>
> And I'm telling you that if we take your argument at face value then 
> there is no absolute guarantee, because this attack is theoretically 
> possible for any cert lifetime longer than a day or so. So we have to 
> fall back on judging relative risk, and that is what I've been trying to 
> do in my analysis.
>
>   
Yes, we agree on that completely. That's why I'm asking for something 
which is *reasonable*. Ten years of domain validated certs are not 
*reasonable*.


-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to