On 30/12/08 06:45, Ben Bucksch wrote:
On 28.12.2008 14:23, Ian G wrote:
[1] disclosure, I work as an auditor

So, Ian, what are you trying to tell us? We can't yank roots. We can't
rely on audits. How are we supposed to restore and ensure proper
operation of the system?


Right. There are no easy solutions. I don't have them. What I would avoid however is following the old prescriptions without understanding them better. That will involve more work for all, papering over the cracks, and in the end, less security. This is what happened to the financial system...


Obviously, just trusting CAs blindly and hoping for the best doesn't work.
Not even an interested, security-conscious user can just walk into a CA
and verify their operations, so they *have* to rely on us.


In this I would differ somewhat :) In my time as an auditor, I have seen very little that needs to be secret, confidential or closed [1]. In particular, all of the verification processes are more or less available for open scrutiny already. As you yourself have shown, it was possible for you to read the CPS and the audit opinion, and work out that the reseller situation was as we found in the experiences. It's also possible for anyone to buy a cert and find out what it feels like, and today's discussion wasn't the first time this was done.

The difference is between the belief that "only" an auditor can verify these things, and what you can really do.

Consider that Mozo musters some 150 million end-users. Probably a million of those are interested parties. Probably 100k of those are technically savvy and interested in security. Of those, I suggest we can find 1000 who can read and comment on the CPS *and* review the verification processes of every CA under consideration.

(I have seen this concept in other places. It works if you get enough people, enough openness in thinking, and enough value on the table. It works in open source for example.)

So, where we would be heading is this:

* reducing the scope of the audit to only those areas that cannot be opened up. * increasing the verification by the people over those areas that are open, either already, or easy to open.

E.g., think about the current event. We now know far more about that verification than the audit ever told us. It's simple: just buy a few certs and report back.

The cost of the certs is $10 -> $100, and the cost of the audit is $100k---> ... It's even cheaper this way.


Being able to yank roots, and relying on the auditor to verify and
ensure that the actual, day-to-day operations follow the documented
processes, and reading the process document to verify that it meets the
requirements of our policy and our user's needs, is fundamental to the
whole SSL thingy. Otherwise it's useless snake-oil, which harms users
who rely on it - on *us* (Mozilla).


Well, that is the old message from 1995. The message was constructed before we saw how it worked in practice. Things have changed a lot since then, especially we now know much more about open processes, and we know how the net really works.

Instead, consider the reputational damage to the CA as the primary vector of harm. If a CA is criticised, this hurts their business [2].

If we had independent security researchers posting on their experiences, then this would enable a "CHOICE" style of approach to evaluating security [3].

(Yes, there are some who believe that all CAs must be equivalent, and all end-users are to be protected from any differences. I am pointing out that this very core principle is a root cause of all our troubles. It is unsustainable, and must break one day if security against a real attacker is to be the intent. There is no real security system that survives without end-to-end security, and the user is always the end.)

Of course, these are just my opinions, and many do not agree to them!



iang

[1] Comodo provided some confirmation of this when they stated that much of what we were talking about they *could* open up but would only do it if all CAs were required to. E.g., it is closed for commercial reasons, not security or verification reasons.

[2] This particular time it failed to reach the press in any big way (for reasons you can speculate on).

[3] By CHOICE I mean the consumer magazine in some countries where the suppliers are kept at distance. This would be the exact opposite group to CABForum for example, where users are kept at distance.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to