On Sun, 12 Aug 2012 13:29:57 -0400
Nico Kadel-Garcia <nka...@gmail.com> wrote:

> Such certificates have already been stolen. They're dependent on the
> security of the intermediate key owners, and the are demonstrably
> unsecure: Check this URL for more details on the release of rogue SSL
> signing certificates through a Dutch firm:
> 
>     
> http://www.computerworld.com/s/article/9219606/Hackers_stole_Google_SSL_certificate_Dutch_firm_admits
> 

So why isn't there a good way for an end user to strictly limit trust
in, for example, a "Google Internet Authority" to those domains that
are actually owned by Google, and conversely, not to trust any other
authority to sign certs for domains owned by Google?

A single organization is about as far as I'd ideally want to extend
trust at any one time anyway, and only for what I trust that
organization for, because this whole SSL/x.509/PKI thing superficially
appears to be hierarchical, but (as you've pointed out) in reality
there is no hierarchy, because there are no limits to how far the trust
is extended once we have these unknown intermediate certs. And just
earlier this year, we're informed of a rather interesting "common
industry practice": 

http://www.computerworld.com/s/article/9224082/Trustwave_admits_issuing_man_in_the_middle_digital_certificate_Mozilla_debates_punishment

So you can close the barn door all you want with revocation, but that
won't bring the cows back home from this particular pasture.

Reply via email to