Eddy Nigg (StartCom Ltd.) wrote: > Frank Hecker: >> (As a side note, based on my experience with and reading about >> industry dynamics, I think that advances in PKI-related technologies >> are much more likely to occur in new protocols and new products than >> in mainstream cases like browsing SSL web sites. A good example is >> Skype's implementation of an internal PKI infrastructure for securing >> VOIP traffic.) >> > > Outshhh, I don't like to even get into this one :-) > Except that they are using some kind of PKI and I'm not sure what's so > exceptional or new with it.
I don't want to go off on a tangent, but I think the Skype model is more significant than you think. I don't agree with Ian Grigg on everything, but I do think his proposed rule that "there is only one mode, and it is secure" is worthwhile: http://iang.org/ssl/h3_there_is_only_one_mode_and_it_is_secure.html As I understand it, out of the box Skype achieves encryption of users' VOIP calls and strong identification of a particular user's node (not tied to IP address), with no action needed on the part of the user. It doesn't tie a verified legal identity to the Skype instance (and so doesn't fit the classic X.509 model), but arguably this is not important for typical Skype use cases. >> I also think that with the advent of EV and the Firefox 3 UI that the >> world of certs will divide into EV and everything else (OV/IV/DV). >> Maybe I'm missing something, but I can't see any discernible >> difference between the UI for https://www.bankofamerica.com/ (OV cert) >> and the UI for https://www.hecker.org/ (DV cert). > > Which I personally view as a mistake, because I believe DV and IV/OV > certificates should be separated. See my separate comments on this point. > If EV doesn't become mainstream and > will replace IV/OV certs, than Mozilla (and the industry) will have to > come up with some better answers and address this particularly. If EV doesn't become mainstream, then IMO that will signal the utter irrelevance of the traditional PKI/CA model in terms of protecting user security for high-value transactions. After all, the EV model is the very embodiment of traditional thinking about how PKIs can protect user security: have a trusted third party do strong verification of legal identity and bind that identity to a public key, and have users then rely on that authenticated identity before entering into high-value transactions. If web site operators don't care to participate in the EV scheme, and web site users don't care if they don't see a strongly validated identity in the browser UI, then the only significant function of SSL in practice is to provide over-the-wire encryption and some minimal protection against MITM attacks. > When in the software world an exploit is detected, the software is > usually patched. When an exploit is detected in NSS, it's going to be > patched. If however an exploit is detected by a CAs procedure you > propose we do nothing until you are convinced that actually somebody is > exploiting it and than you propose to adjust the thinking about the > proposed threat. Really Frank? If there is a significant cost to protecting against a hypothetical exploit, and there are alternate means of dealing with the exploit in question (particularly more general measures that address more than just the exploit in question), then I suggest that we think carefully before investing time in implementing protection measures designed to deal specifically with such a hypothetical exploit. Take your idea of requiring identity verification for wildcard DV certs, which is designed to address the hypothetical threat of people setting up SSL-enabled phishing sites under their top-level domains (e.g., paypal.example.com). There's are multiple cost to implementing such an idea: a cost to CAs (who may have to change their procedures and product offerings), a cost to cert subscribers (who may have to pay more for certs), a cost to us (who have to figure out all the CAs doing wildcard DV certs, and then try to persuade them to change what they're doing), and potentially a cost to end users (e.g., if they can no longer access sites because we decide to punish CAs by removing their roots or disabling validation of certain wildcard certs). At the same time there are measures already in place to protect users against the general phishing threat, most notably the Firefox "phishing protection" features; these measures work against phishing sites using the hypothetical wildcard DV cert exploit, and against other phishing sites as well. There is also a general measure available to provide more assurance and accountability for web sites doing high-value SSL-enabled transactions, namely EV certs. So the specific question for me is as follows: Should I devote Mozilla Foundation resources (including my own time) to trying to combat the hypothetical threat posed by wildcard DV certs, a threat for which other protection measures already exist and would appear to be effective, or should I devote those resources to other tasks that arguably offer a greater return on investment in terms of increased security, like say getting more EV-qualified CAs approved to have their EV certs recognized in Firefox? That's a pretty easy question for me to answer. Frank -- Frank Hecker [EMAIL PROTECTED] _______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto