Re: Another protection layer for the current trust model

2010-03-04 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: it has exposed an unrelenting amount of accusation without evidence. Show us a single falsified certificate. Anything less is unworthy of this forum. A large amount of that. But not necessarily exclusively. There is in what has been reported one fact that has merit to

Re: Another protection layer for the current trust model

2010-02-22 Thread Eddy Nigg
Hi Kurt, I think it's more subtle than that, some of the problems in brief: 1) Mozilla/Firefox either trust a CA 100% or not at all. Correct. 3) It's very difficult even for technical users to find out who exactly signed a certificate. For example a certificate is signed by "valicert",

Re: Another protection layer for the current trust model

2010-02-22 Thread Martin Paljak
Hello Kurt and others. This is something I'd like to see a very long answer from someone in charge of these thing in Mozilla. TIA, Martin. On Feb 22, 2010, at 23:25 , Kurt Seifried wrote: > > This does not mean that the certificate verification mechanics are at fault; > it only means that CA s

Re: Another protection layer for the current trust model

2010-02-22 Thread Kurt Seifried
> > > > This does not mean that the certificate verification mechanics are at > fault; > it only means that CA selection protocol has not been thought out properly: > it limped along with a handful of CAs, it is showing the serious symptoms > of the malaise with hundreds. In the meantime, does anyb

Re: Another protection layer for the current trust model

2010-02-22 Thread makrober
Nelson B Bolyard wrote: On 2010/02/22 02:11 PST, makrober wrote: CHHIC controversy has exposed the fallacy of current SSL implementation premise, Rather, it has exposed an unrelenting amount of accusation without evidence. Show us a single falsified certificate. Anything less is unworthy o

Re: Another protection layer for the current trust model

2010-02-22 Thread Nelson B Bolyard
On 2010/02/22 02:11 PST, makrober wrote: > Nguyễn Đình Nam wrote: >>> What you're trying to do is a "who is watching the watchers" kind thing... > >> ...Every existing CA [...] made a promise to comply to the universal PKI >> trust policy, we just need a scheme to enforce their promise. > > If

Re: Another protection layer for the current trust model

2010-02-22 Thread Martin Paljak
On Feb 22, 2010, at 13:03 , Nguyễn Đình Nam wrote: >> > I agree with you that you should revive the CA selection protocol, but > we should also add 01 Auditing layer above of it anyway, it's an > independent problem. CA-s are audited, AFAIK that's one of the basic requirements. If your problem is

Re: Another protection layer for the current trust model

2010-02-22 Thread Nguyễn Đình Nam
On Feb 22, 5:11 pm, makrober wrote: > > ...Every existing CA [...] made a promise to comply to the universal PKI > > trust policy, we just need a scheme to enforce their promise. > > If we need a scheme to enforce some TTP's promise of uncorruptibility, he > evidently does not qualify as a Trusted

Re: Another protection layer for the current trust model

2010-02-22 Thread makrober
Nguyễn Đình Nam wrote: What you're trying to do is a "who is watching the watchers" kind thing... ...Every existing CA [...] made a promise to comply to the universal PKI > trust policy, we just need a scheme to enforce their promise. If we need a scheme to enforce some TTP's promise of unco

Re: Another protection layer for the current trust model

2010-02-22 Thread Nguyễn Đình Nam
> What you're trying to do is a "who is watching the watchers" kind thing and > as you described, you do this by adding another central piece of machinery to > the picture where another central piece of machinery is easily manipulated > into rogue actions. I don't see how this would make anythin

Re: Another protection layer for the current trust model

2010-02-21 Thread Martin Paljak
On Feb 22, 2010, at 05:20 , Nguyễn Đình Nam wrote: > On Feb 22, 3:56 am, Eddy Nigg wrote: >> On 02/21/2010 09:34 AM, Nguyễn Đình Nam: >> >>> The way to solve it is not to inform people of each potential attack, >>> because there will be too many false positive, pushing people to just >>> ignore i

Re: Another protection layer for the current trust model

2010-02-21 Thread Nguyễn Đình Nam
On Feb 22, 3:56 am, Eddy Nigg wrote: > On 02/21/2010 09:34 AM, Nguyễn Đình Nam: > > > The way to solve it is not to inform people of each potential attack, > > because there will be too many false positive, pushing people to just > > ignore it, rendering the scheme ineffective. The way to solve it

Re: Another protection layer for the current trust model

2010-02-21 Thread Eddy Nigg
On 02/21/2010 10:56 PM, Eddy Nigg: On 02/21/2010 09:34 AM, Nguyễn Đình Nam: The way to solve it is not to inform people of each potential attack, because there will be too many false positive, pushing people to just ignore it, rendering the scheme ineffective. The way to solve it is to let a sma

Re: Another protection layer for the current trust model

2010-02-21 Thread Eddy Nigg
On 02/21/2010 09:34 AM, Nguyễn Đình Nam: The way to solve it is not to inform people of each potential attack, because there will be too many false positive, pushing people to just ignore it, rendering the scheme ineffective. The way to solve it is to let a small number of relevant and knowledgab

Re: Another protection layer for the current trust model

2010-02-20 Thread Nguyễn Đình Nam
> If this solution would solve the problem in such an easy way, why isn't > it already in use for more than a decade? Recent studies going at task > with those accessing SSH servers have shown that most users simple edit > their known_hosts file - those people are way more knowledgeable than > the

Re: Another protection layer for the current trust model

2010-02-20 Thread Eddy Nigg
On 02/21/2010 04:11 AM, Nguyễn Đình Nam: I think you didn't look closely at my description. The intrusion detection servers track the changes of certificates belong to a host name over time, reported by user agent software around the world, this is just like "Perspectives". If there is one time t

Re: Another protection layer for the current trust model

2010-02-20 Thread Nguyễn Đình Nam
> 1. How do you secure the connection to the perspectives server? The software to be released with predefined intrusion detection servers, each comes with it's own X.509 certificate, should be self signed. It's a kind of "Auditive" mechanism, by using it, we should be suspicious of any CA, so we wo

Re: Another protection layer for the current trust model

2010-02-20 Thread Nelson B Bolyard
On 2010-02-20 08:46 PST, Nguyễn Đình Nam wrote: [yet another promotion of "perspectives"] Questions/issues: 1. How do you secure the connection to the perspectives server? (This is a recursive problem) 2. How do you avoid false reports for the multiple servers that legitimately claim to be th

Re: Another protection layer for the current trust model

2010-02-20 Thread Nguyễn Đình Nam
I forget to mention, I aware there are two similar mechanisms: "Perspectives": http://www.cs.cmu.edu/~perspectives/firefox.html "Certificate Patrol": https://addons.mozilla.org/en-US/firefox/addon/6415 According to my analysis, my proposed mechanism has following advantages: * Easier to use: no in

Another protection layer for the current trust model

2010-02-20 Thread Nguyễn Đình Nam
Background Recently I have read the problem of Mozilla and CNNIC. Many years ago, I was a cryptography researcher, I worked on this problem when my country – Vietnam – started working on a central PKI. Vietnam is similar to China, the possibility of being cheated by rogue certificates created under