Ian G wrote, On 2008-10-20 19:24:

> There are possibilities.  One is the server-side self-signed certs,
> which would generally prefer KCM to be useful, so add Petnames.
> This is ok for small sites, small communities, but valuable there as
> compromised boxes are a pain.

The Debian OpenSSL fiasco caused the creation of 3*65536 bad keys of
each and every conceivable size (e.g., 1024 bit, 1025 bit, 1026 bit ...).
A file was created that contained all those keys for two popular sizes,
1024 bit and 2048 bit, and when compressed, that file is about the size
of the entire browser download.

It is widely agreed that, since KCM has no central revocation facility,
the only way to effectively handle revocation is for individual KCM
clients and servers, which is to say, users, to download those enormous
files of bad keys, and check their sets of trusted keys against those
files.  Tools for doing that are available to SSH users now.  Users who
don't do that, who don't download and use those enormous compromised key
lists (CKLs) and their checking programs, will be forever vulnerable to
those compromised keys.

Further, new KCM keys should be tested against those files before being
added to the user's trusted list.  This has given rise to the proposal
to add code to do that to the browser.  But the prospect of adding such
enormous CKLs to browser downloads seems to be unacceptable to nearly
everyone in Mozilla land.  I think that says that KCM really must be
relegated to the uses that really don't care about MITM, not even in the
least tiny little bit.

Personally, I have no such uses.  I have no need for encryption that is
vulnerable to MITM, but evidently lots of people think they do.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to