let's clarify what is CA from the user's point of view.

i *did* install certificates in a test scenario, so my self signed
openssl setup is without doubt CA to the users - no matter if it
verifies up to the root chain.

the point is i don't want certs in *my* keystore with CN="joro the terrorist"
signed by whatever CA - FYI i trust the root CAs as much as i trust
viagra spammers.


about the weak key: the idea is to force a <keygen> to generate weak
key that is sent to attacker. the attacker cracks the private key by
only using the public key and
returns self signed cert to the luser - the luser doesn't realize this.



On Tue, Jun 02, 2009 at 10:31:21AM +0200, Anders Rundgren wrote:
> A genuine problem is that <keygen> and its cousins cannot actually
> tell the CA if the key is stored on the hard-disk or on a smart card and
> if there is PIN protection etc.  From a practical point-of-view this means
> that smart cards are out-of-scope for <keygen>. 
> 
> Real card provisioning systems therefore typically cost $10 000 and up
> and mostly only run on Windows.  They usually come with professional
> services as well :-)
> 
> Now, over to your concerns....
> 
> >the standard should make it clear how the signed response is handled.
> 
> Yes.
> 
> >currently, after you visit a malicious page the only thing you see is:
> >"your certificate is installed [OK]"
> >the certificate can be issued to whatever name the attacker choses.
> >if an attacker can force a weak private key which is later broken, it
> >can be self signed and stored on the poor user's machine - this is not
> >much fun anymore.
> 
> I think you need to analyze this a bit more.  It is the RP (relying party)
> that trusts the certificate and the CA who issues it.   If the key is weak 
> (short?)
> the CA (who has a policy) will presumably reject the request.  If the key is
> self-signed the RP will reject it (unless it is S/MIME which is very difficult
> to deal with anyway since you need to "trust" an infinite number of CAs
> but that's not a <keygen> issue).
> 
> >i think the standard should write something like:
> >after receiving the certificate, the user must be given an option to
> >examine it and to ignore it.
> 
> The user should IMO have an option to abort a key generation request
> because such opens for (pretty lame) attacks on key db space.
> 
> The rest is in the hands of RPs and CAs.  CAs that produce bogus
> certificates do not constitute of a threat to end-users but maybe to
> RPs but that's out-of-scope for most users.  It is similar to credit-cards;
> you don't have to verify the validity of your VISA card, that's an
> issue for merchants and payment networks.  If users want to study
> certificates, the existing browser GUIs already offer this option.
> 
> If you pay money for a bogus certificate that's bad but unfortunately
> PKI is far too complex for human verification so there is no cure.
> It is BTW no different to buying anything else on the Internet.
> 
> Anders
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to