Re: Debian Weak Key Problem

2008-06-23 Thread Eddy Nigg
Gervase Markham: > Rob Stradling wrote: >> That is now old news. I'm pleased to announce that... > > > > > Gerv StartCom has concluded today the revocation of all vulnerable keys which were signed by any of our roots, respectively intermediate CA certificates. Several notifications were sent

Re: Debian Weak Key Problem

2008-06-19 Thread Gervase Markham
Rob Stradling wrote: > That is now old news. I'm pleased to announce that... Gerv ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Debian Weak Key Problem

2008-06-18 Thread Rob Stradling
"Comodo is offering a free replacement SSL certificate to any affected business, regardless of their original provider...No mention of any CA actively contacting affected customers, much less revoking any certs." That is now old news. I'm pleased to announce that... 1. Our systems will now use

Re: Debian Weak Key Problem

2008-06-17 Thread Gervase Markham
Michael Ströder wrote: > Thanks for your clear action. I'm pretty sure customers are also > appreciating this. I don't know about customers. Relying parties certainly are, though :-) Gerv ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.or

Re: Debian Weak Key Problem

2008-06-16 Thread Michael Ströder
Eddy Nigg wrote: > Jean-Marc Desperrier: >> Eddy Nigg wrote: >>> [...] >>> StartCom has scanned and detected all vulnerable keys and informed the >>> affected subscribers. We'll revoke all compromised keys within a short >>> time. >> >> Can you tell how much it represented in percentage of the issu

Re: Debian Weak Key Problem

2008-06-16 Thread Eddy Nigg
Jean-Marc Desperrier: > Eddy Nigg wrote: >> [...] >> StartCom has scanned and detected all vulnerable keys and informed the >> affected subscribers. We'll revoke all compromised keys within a short >> time. > > Can you tell how much it represented in percentage of the issued > certificates ? Yes,

Re: Debian Weak Key Problem

2008-06-16 Thread Jean-Marc Desperrier
Eddy Nigg wrote: > [...] > StartCom has scanned and detected all vulnerable keys and informed the > affected subscribers. We'll revoke all compromised keys within a short > time. Can you tell how much it represented in percentage of the issued certificates ? __

Re: Debian Weak Key Problem

2008-06-15 Thread Eddy Nigg
Paul Hoffman: > http://news.netcraft.com/archives/2008/06/12/ssl_certificates_vulnerable_to_openssl_flaw_on_debian.html > > > The last paragraph says: > > = > Although a number of certificate authorities have offered free > replacement certificates to customers affected by the Debian OpenSSL >

Re: Debian Weak Key Problem

2008-06-13 Thread Paul Hoffman
http://news.netcraft.com/archives/2008/06/12/ssl_certificates_vulnerable_to_openssl_flaw_on_debian.html The last paragraph says: = Although a number of certificate authorities have offered free replacement certificates to customers affected by the Debian OpenSSL vulnerability, it has been r

Re: Debian Weak Key Problem

2008-06-13 Thread Jean-Marc Desperrier
Gervase Markham wrote: > Jean-Marc Desperrier wrote: >> Well, CRL can also be made to scale properly to handle a large number of >> revocation, but this requires a few operationnal changes. > > ...which presumably have to be made before you issue the certs? Yes, but the reason why only 20% of the

Re: Debian Weak Key Problem

2008-06-12 Thread Gervase Markham
Jean-Marc Desperrier wrote: > Well, CRL can also be made to scale properly to handle a large number of > revocation, but this requires a few operationnal changes. ...which presumably have to be made before you issue the certs? > The alternative in order to avoid changing the CA constantly would b

Re: Debian Weak Key Problem

2008-06-11 Thread Jean-Marc Desperrier
Gervase Markham wrote: > [...] >> If we see >> cooperation from CA's in quickly revoking those certs which are >> vulnerable, that would be enough to convince mozilla the right way to >> solve the problem is to depend on option 1 and fix revocation in the >> existing browsers. >> >> This is an oppo

Re: Debian Weak Key Problem

2008-06-11 Thread Gervase Markham
Robert Relyea wrote: > 1) work with CA's, in their existing infrastructures to get those certs > revoked. > 2) include that list of keys in the browser itself to detect this > compromise. > 3) build a parallel revocation scheme to phone home to mozilla (a.la. > anti-phishing) to identify sites with

Re: Debian Weak Key Problem

2008-06-11 Thread Jean-Marc Desperrier
Michael Ströder wrote: > Eddy Nigg (StartCom Ltd.) wrote: >> I could produce millions of keys in my free time and post them to some >> web site...I could tell you now that those are all compromised keys >> and all CAs should now scan their subscribers keys against the ones I >> posted. Should it fi

Re: Debian Weak Key Problem

2008-06-10 Thread Kyle Hamilton
If the CPS doesn't define it as "compromised" in that circumstance, then the CA with that CPS has no business being trusted by me. Yet, I'm never given a choice. Not unless I go through each and every single entry in the root list and apply my own criteria to it. Better, for me, to not have to d

Re: Debian Weak Key Problem

2008-06-10 Thread Paul Hoffman
At 7:50 PM -0700 6/9/08, Nelson B Bolyard wrote: >Paul Hoffman wrote, On 2008-06-09 18:31 PDT: >> At 2:56 PM -0700 6/9/08, Nelson B Bolyard wrote: > a CA that tries to save the customer by revoking the possibly-compromised domain's keys is overstepping its responsibility. >>> >>> The

Re: Debian Weak Key Problem

2008-06-10 Thread Robert Relyea
Aren't the people who send their credit card number on an https connexion where the private key of the server is public knowledge already screwed ? Yes, of course. The question for this thread is: who is responsible for each screwedness? I beg to differ. The question is:

Re: Debian Weak Key Problem

2008-06-10 Thread Kyle Hamilton
On Sun, Jun 8, 2008 at 5:56 PM, Paul Hoffman <[EMAIL PROTECTED]> wrote: > At 1:28 PM -0700 6/8/08, Kyle Hamilton wrote: >>How much does it cost the CA to mint a new certificate? How much >>liability does the CA assume in the case where a subject's certificate >>is used by someone other than the su

Re: Debian Weak Key Problem

2008-06-10 Thread Michael Ströder
Nelson B Bolyard wrote: > Agreed, and part of the discussion here is: is it acceptable to Mozilla > to continue to "trust" certs from CAs who don't revoke timely in the > presence of evidence? I hope not. Such CAs provide only "security > theater", IMO. Yupp. > Actually, I think most of them al

Re: Debian Weak Key Problem

2008-06-10 Thread Michael Ströder
Paul Hoffman wrote: >> The keys in question are not "possibly compromised". They are >> compromised. >> Period. > > Until we see any evidence of this in the real world, we disagree. Oh, come on. With ready-to-use tools to scan for these weak keys the evidence is there. >> A CA who informs it r

Re: Debian Weak Key Problem

2008-06-10 Thread Michael Ströder
Eddy Nigg (StartCom Ltd.) wrote: > I could produce millions of keys in my free time and post them to some > web site...I could tell you now that those are all compromised keys and > all CAs should now scan their subscribers keys against the ones I > posted. Should it find one, it should revoke i

Re: Debian Weak Key Problem

2008-06-10 Thread Michael Ströder
Nelson B Bolyard wrote: > It may be reasonable for a CA to assume that the subscriber has taken due > care to generate a good key pair at the time that the certificate signing > request is received, but at such time as the CA has evidence that the key > is compromised (especially public evidence),

Re: Debian Weak Key Problem

2008-06-09 Thread Nelson B Bolyard
Paul Hoffman wrote, On 2008-06-09 18:31 PDT: > At 2:56 PM -0700 6/9/08, Nelson B Bolyard wrote: >>> a CA that tries to save the customer by revoking the possibly-compromised >>> domain's keys is overstepping its responsibility. >> >> The keys in question are not "possibly compromised". They are c

Re: Debian Weak Key Problem

2008-06-09 Thread Eddy Nigg (StartCom Ltd.)
Nelson B Bolyard: One or more well known and large CAs have already found many certs whose public keys are in that list. There's no question that those keys are compromised, The question is: what are the CAs' responsibility regarding the certs with those compromised keys? That really depen

Re: Debian Weak Key Problem

2008-06-09 Thread Nelson B Bolyard
Eddy Nigg (StartCom Ltd.) wrote, On 2008-06-09 17:19: > Nelson B Bolyard: >> >> In this case, the guy held up a bag of ~96 thousand private keys and said >> "See, here are 96 thousand private keys that I possess. Anyone can have a >> copy of them." I can't imagine better proof of key compromise

Re: Debian Weak Key Problem

2008-06-09 Thread Paul Hoffman
At 2:56 PM -0700 6/9/08, Nelson B Bolyard wrote: >Paul Hoffman wrote, On 2008-06-09 09:41: >> At 11:22 AM +0200 6/9/08, Jean-Marc Desperrier wrote: > >>> Aren't the people who send their credit card number on an https >>> connexion where the private key of the server is public knowledge >>> alr

Re: Debian Weak Key Problem

2008-06-09 Thread Eddy Nigg (StartCom Ltd.)
Nelson B Bolyard: In this case, the guy held up a bag of ~96 thousand private keys and said "See, here are 96 thousand private keys that I possess. Anyone can have a copy of them." I can't imagine better proof of key compromise than that. Oh well, I could add another few thousands to tho

Re: Debian Weak Key Problem

2008-06-09 Thread Nelson B Bolyard
Eddy Nigg (StartCom Ltd.) wrote, On 2008-06-09 15:23: > Nelson B Bolyard: (quoting Paul Hoffman, quoting Jean Mark Desperrier) Aren't the people who send their credit card number on an https connexion where the private key of the server is public knowledge already screwed ?

Re: Debian Weak Key Problem

2008-06-09 Thread Eddy Nigg (StartCom Ltd.)
Nelson B Bolyard: Aren't the people who send their credit card number on an https connexion where the private key of the server is public knowledge already screwed ? Yes, of course. The question for this thread is: who is responsible for each screwedness? I beg to differ. The qu

Re: Debian Weak Key Problem

2008-06-09 Thread Nelson B Bolyard
Paul Hoffman wrote, On 2008-06-09 09:41: > At 11:22 AM +0200 6/9/08, Jean-Marc Desperrier wrote: >> Aren't the people who send their credit card number on an https >> connexion where the private key of the server is public knowledge >> already screwed ? > > Yes, of course. The question for this

Re: Debian Weak Key Problem

2008-06-09 Thread Nelson B Bolyard
Kyle Hamilton wrote, On 2008-06-08 13:28: > My thought is that if there's any knowledge that a CA has that a key > has been compromised, the CA can no longer verify the binding of the > key to the subject -- which means that the certification should not > exist, and thus must be revoked. On the

Re: Debian Weak Key Problem

2008-06-09 Thread Michael Ströder
Paul Hoffman wrote: > > However, given that a CA cannot know whether or not a domain has been > compromised, a CA that tries to save the customer by revoking the > possibly-compromised domain's keys is overstepping its responsibility. Whether the CA is overstepping its responsibility is subjec

Re: Debian Weak Key Problem

2008-06-09 Thread Paul Hoffman
At 11:22 AM +0200 6/9/08, Jean-Marc Desperrier wrote: >Paul Hoffman wrote: >> [...] >> Sure, but that's not the model most CAs have with their customers. I >> would bet that if a CA sent out a message saying "we're revoking your >> cert tomorrow, here's a new one" to all of its affected custome

Re: Debian Weak Key Problem

2008-06-09 Thread Jean-Marc Desperrier
Paul Hoffman wrote: > [...] > Sure, but that's not the model most CAs have with their customers. I > would bet that if a CA sent out a message saying "we're revoking your > cert tomorrow, here's a new one" to all of its affected customers, fewer > than 95% would have the new cert installed correctl

Re: Debian Weak Key Problem

2008-06-08 Thread Paul Hoffman
At 1:28 PM -0700 6/8/08, Kyle Hamilton wrote: >How much does it cost the CA to mint a new certificate? How much >liability does the CA assume in the case where a subject's certificate >is used by someone other than the subject through no real fault of the >subject's? Zero and zero. How much hass

Re: Debian Weak Key Problem

2008-06-08 Thread Eddy Nigg (StartCom Ltd.)
Kyle Hamilton: How much does it cost the CA to mint a new certificate? Not much...guess that part is covered by the standing run time costs of the CA. How much liability does the CA assume in the case where a subject's certificate is used by someone other than the subject through no real fa

Re: Debian Weak Key Problem

2008-06-08 Thread Kyle Hamilton
On Sun, Jun 8, 2008 at 5:21 AM, Michael Ströder <[EMAIL PROTECTED]> wrote: > Andrews, Rick wrote: >>> That strikes me as a policy that one might describe as "attacker >> friendly". >>> I suggest: revoke first, contact later. >>> >>> When you revoke the certs, you're protecting your relying parties

Re: Debian Weak Key Problem

2008-06-08 Thread Michael Ströder
Andrews, Rick wrote: >> That strikes me as a policy that one might describe as "attacker > friendly". >> I suggest: revoke first, contact later. >> >> When you revoke the certs, you're protecting your relying parties, and >> you can count on your relying parties to contact the subjects whose >> ce

Re: Debian Weak Key Problem

2008-06-06 Thread Andrews, Rick
> Andrews, Rick wrote, On 2008-06-04 15:24: > >> It seems that CAs are not bothering to contact their customers with > >> weak keys[1], although they are of course revoking the keys of > >> customers who ask, and reissuing certificates. > > > > Gerv, > > > > I just wanted to mention that we've b

Re: Debian Weak Key Problem

2008-06-06 Thread Nelson B Bolyard
Andrews, Rick wrote, On 2008-06-04 15:24: >> It seems that CAs are not bothering to contact their customers with >> weak keys[1], although they are of course revoking the keys of >> customers who ask, and reissuing certificates. > > Gerv, > > I just wanted to mention that we've been working fev

Re: Debian Weak Key Problem

2008-06-06 Thread Gervase Markham
Andrews, Rick wrote: > I just wanted to mention that we've been working feverishly to automate > checking of all valid certs in our databases. It's taking time because > it's a huge task - we have hundreds of thousands of certs to check - but > we intend to notify any customer who is using a weak k

RE: Debian Weak Key Problem

2008-06-05 Thread Andrews, Rick
> It seems that CAs are not bothering to contact their customers with weak > keys[1], although they are of course revoking the keys of customers who > ask, and reissuing certificates. Gerv, I just wanted to mention that we've been working feverishly to automate checking of all valid certs in our