On 2022-01-04 at 14:37:18 UTC-0500 (Tue, 4 Jan 2022 11:37:18 -0800)
Michael <keybou...@gmail.com>
is rumored to have said:

On 2022-01-03, at 4:12 PM, Richard L. Hamilton <rlha...@smart.net> wrote:

The only problem with that or anything similar, is that unless you go to quite a lot of work to just download rather than install the PEM file, and convert it into something human readable WITHOUT installing it, and investigate every certificate in there, you're trusting that the site you got it from is not only legit, but is secure and hasn't been hacked to alter the file to provide some very bogus certificates that could work together with some sort DNS spoofing to get you to feed sensitive information (ie bank passwords, etc) via an untrusted site that would capture it.

Makes sense. Now, how do you go about turning a certificate into something human readable? Serious question, I have *never* seen this discussed anywhere.

Get the certificate in PEM format, then:

   openssl x509 -text < cert.pem

See the man page ('man x509') for all the very gory details.

Everyone just says "As long as the roots are good you can trust the chain", and that's never made sense to me. The whole "trust what strangers say" system seems more like "Find a way for companies to make money" than any good security system.

Well, yes: that's what the public CA system is. It is grounded in the OSI protocol stack, which is big on hierarchical authority, and no one has figured out a better model that scales and allows strangers to establish authenticated private data transport. Ultimately it requires shared trust anchors of some sort, and the model we've stumbled into has the advantage of not being subject to a single authority and encouraging the various CAs and bundlers of trust to keep watch on each other.

A mechanism for eliminating the CA-based hierarchical trust layer already exists in the DANE (DNS-based Authentication of Named Entities) standard that is in broad use for validating email trasnsport. It replaces the CA model by binding the trust chain to DNS, making certificate trust ultimately dependent on DNSSEC and subject to all of its risks.


--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Not Currently Available For Hire

Reply via email to