First off, please note that this is a proposed *change* to the PKI system. A small change, but nevertheless a change, yes. We're trying to make it more secure. So, "That goes against current definitions" is not an argument, it's inherent.

No, the question OCSP asks is ... "is this cert revoked, as of the current date" ?

That's what we need, yes.

The OCSP responder is also allowed to forget about the revocation status of any cert that's outside its validity period.

Our CAs would not be allowed to do that. It's fairly trivial to keep the whole list. It's not going to grew over a Gigabyte, any MySQL could do that. Including the replication to have it redundant.

Thanks for the note, though.


[Key continuity by old key signing new one]

When someone chooses to use a new key, they can simply get a new certificate containing the public key and get it signed by the CA.

Currently, yes. But so could anybody else in the world who manages to get past the CA. And immediately get access to all customers. (See below) This is what I consider the inherent and most important weakness of the PKI system, what makes it impossible for me to trust it. This is exactly what this proposal is supposed to stop.

The warning, in turn, ensures that you cannot just walk to *any* CA, without any connection to the victim site, and get a valid cert. It *has* to be signed by the private key, which means the attacker *has* to break into my systems.
You could also solve that problem by having only one trusted root, or having roots that use name constraints. Then everybody would have only one CA they could go to.

No. If that one CA then doesn't do a decent job, makes an error, that's no help either. With "connection to the victim site", I meant that *I* (as cert owner) have to be involved somehow in approving the certificate when it wants to be valid for my existing users. "Involved" includes my site being hacked, but that's at least something I can influence to some degree.
I have absolutely no control over how a CA does it job.

I don't want it to get into the middle of my *existing* relationships, that's the core.

This means that if I can manage to keep my systems secure, there's really no way an attacker can get between me and my existing users / communication partners. This is as secure as it gets. (If an attacker breaks into one of the partners' systems, all bets are off, in any system.)

Given what we know about warnings and how they are ignored by most users who don't understand them, I certainly wouldn't put too much faith into that !

If you assume that users ignore and override all warnings, we are already screwed with the current system, because the user can also override a self-signed cert. Yet, that warning is now a serious stopgap for attackers of a bank. And it definitely helps security-conscious users.

If one wanted to have another signature, it wouldn't be as an extension, since, as Nelson pointed out, extensions are part of what gets signed.

Yes, sorry for the inprecision, I meant here "extension" in the sense that it's something added to the cert definition, not the existing extension mechanism.

The current single signature is not an extension.

Well, I guess somebody did it anyway :
http://www.freepatentsonline.com/y2008/0270788.html

Thanks for the link.
What I am thinking of (which I think is different from that patent) is that we attach something to the end (or beginning) of the binary blob that is the cert, in a way that it treated as garbage by older browsers.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to