25 June 2011. Related New York Times report today on new Internet security/trust
initiative, DNSSEC:
http://www.nytimes.com/2011/06/25/science/25trust.html
Certificates of Authentication Are Daft
Date: Sat, 25 Jun 2011 16:48:15 -0400
From: Ian G <iang[at]iang.org>
Crypto discussion list <cryptography[at]randombit.net>
Subject: [cryptography] this house believes that user's control over the
root list is a placebo
On 21/06/11 4:15 PM, Marsh Ray wrote:
> On 06/21/2011 12:18 PM, Ian G wrote:
>> On 18/06/11 8:16 PM, Marsh Ray wrote:
>>> On 06/18/2011 03:08 PM, slinky
wrote:
>>
>>> .... But we know there are still hundreds of "trusted" root
CAs, many from governments, that will silently
>>> install themselves into Windows at the request of any website.
Some of these even have code signing
>>> capabilities.
>>
>> Hmmm... I'm currently working on a risk analysis of this sort of
thing.
>> Can you say more about this threat scenario?
>
> I did a blog post about it a while back:
http://extendedsubset.com/?p=33
>
> This was about the CNNIC situation,
Ah, the "I'm not in control of my own root list" threat scenario.
See, the thing there is that CNNIC has a dirty reputation. But CNNIC
passed the test to get into the root lists.
Which do you want? A CA gets into a root list because it is nice and
pretty and bribes its way in? This was the old way, pre 1995.
Or there is an objective test that all CAs have an equivalent hurdle in passing?
This was the post 1995 way.
There's no easy answer to this. Really, the question being asked is
wrong. The question really should be something like "do we need a
centralised root list?"
> since then we've seen Tunisia MITM
> its citizens and they have a national CA as well.
Yup.
> Basically, MS Windows has a list of "Trusted Root CAs". But the
list
> displayed there is actually just a subset of the CAs that are
> effectively trusted. When you browse to a site with a CA not in
this
> list, Windows can contact Microsoft and on-the-fly add that cert to
your
> trusted root store. Innovative, huh?
This is the geek's realisation that they cannot control their list of "trusted"
CAs. Their judgement is undermined, as MS Windows' root list has gone
the next step to dynamic control, which means that the users' ability to
verify the root is undermined a bit more by not having an ability to stop
the future dynamic enhancements.
In practice, if we assume a centralised root list, this is probably the better
result.
It works quite simply: 1 billion users don't check the root list, at
all. They rely entirely on the ueber-CA to generate a good root list.
A tiny fraction of that number (under 1 million, or 0.1%) know about something
called a root list, something perversely called "trust" bits, and the ability
to fiddle those bits. They do that, and imagine that they have achieved
some higher level of security. But, this technique has difficulty
establishing itself as anything more than a placebo.
Any model that offers a security feature to a trivially tiny minority, to
the expense of the dominant majority, is daft. The logical conclusion
of 1.5 decades worth of experience with centralised root lists is that we,
in the aggregate, may as well trust Microsoft and the other root vendors'
root list entirely.
Or: find another model. Change the assumptions. Re-do the security
engineering.
iang
_______________________________________________
cryptography mailing
list
cryptography[at]randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
|