>Mozilla is the only browser vendor these days that maintains its own 
>independent root CA storage for the browser. Chrome, Chromium, Safari, Edge, 
>IE etc all use whatever root CAs are trusted by the operating system. If they 
>can get Windows 10 client PCs pushed to retail with an image that includes 
>their CA...

Google Chrome has it's own root program, and all vendors have been reliant on 
Mozilla's setup for some time. They don't just blindly trust the OS.

------- Original Message -------
On Friday, March 11th, 2022 at 1:34 PM, Eric Kuhnke <eric.kuh...@gmail.com> 
wrote:

> Considering that 99% of non-technical end users of windows, macos, android, 
> ios client devices have no idea what a root CA is, if an authoritarian regime 
> can mandate the installation of a government-run root CA in the operating 
> system CA trust store of all new devices sold at retail, as equipment is 
> discarded/upgraded/replaced incrementally over a period of years, they could 
> eventually have the capability of MITM of a significant portion of traffic.
>
> Presumably with Apple ending shipment of new MacOS devices to Russia and 
> retail sales of new devices, this wouldn't be so much of an issue with MacOS. 
> The process of re-imaging a modified MacOS install .DMG onto a "blank" 
> macbook air or similar with a new root CA included would be non trivial, and 
> hopefully might be impossible due to crypto signature required for a legit 
> MacOS bootable install image.
>
> Mozilla is the only browser vendor these days that maintains its own 
> independen root CA storage for the browser. Chrome, Chromium, Safari, Edge, 
> IE etc all use whatever root CAs are trusted by the operating system. If they 
> can get Windows 10 client PCs pushed to retail with an image that includes 
> their CA...
>
> On Thu, 10 Mar 2022 at 18:27, Dario Ciccarone (dciccaro) via NANOG 
> <nanog@nanog.org> wrote:
>
>> I think the point Eric was trying to make is that while, indeed, the 
>> initial, stated goal might be to be able to issue certificates to replace 
>> those expired or expiring, there's just a jump/skip/hop to force 
>> installation of this root CA certificate in all browsers, or for Russia to 
>> block downloads of Firefox/Chrome from outside the Federation, and instead 
>> distribute versions which would already include this CA's certificate. And 
>> then MITM the whole population without their knowledge or approval.
>>
>> GIVEN: savvy users might know how to delete the certificate, or others may 
>> teach them how, and how to download other CA's certificates (if the 
>> government was to ship only this certificate with the browser). Cat and 
>> mouse game. The North Korean and Chinese governments have been doing these 
>> kind of shenanigans for a long time - I am sure Russia could copy their 
>> model. And considering the tight media control they’re already exercising, I 
>> don't think it is crazy or paranoid to think Internet will be next. They 
>> seem to be already going down that path.
>>
>> PS: opinions and statements, like the above, are my very own personal take 
>> or opinion. Nothing I say should be interpreted to be my employer's 
>> position, nor be supported by my employer.
>>
>> On 3/10/22, 7:38 PM, "NANOG on behalf of Sean Donelan" 
>> <nanog-bounces+dciccaro=cisco....@nanog.org on behalf of s...@donelan.com> 
>> wrote:
>>
>> On Thu, 10 Mar 2022, Eric Kuhnke wrote:
>>> I think we'll see a lot more of this from authoritarian regimes in the
>>> future. For anyone unfamiliar with their existing distributed DPI
>>> architecture, google "Russia SORM".
>>
>> Many nation's have a government CA.
>>
>> The United States Government has its Federal Public Key Infrastructure,
>> and Federal Bridge CA.
>>
>> https://playbooks.idmanagement.gov/fpki/ca/
>>
>> If you use DOD CAC ID's or FCEB PIV cards or other federal programs, your
>> computer needs to have the FPKI CA's. You don't need the FPKI CA's for
>> other purposes.
>>
>> Some countries CA's issue for citizen and business certificates.
>>
>> While X509 allows you to specify different CA's for different purposes,
>> since the days of Netscape, browsers trust hundreds of root or bridged CA
>> in its trust repository for anything.
>>
>> Neither commercial or government CA's are inherently more (or less)
>> trustworthy. There have been trouble with CA's of all types.
>>
>> A X509 certificate is a big integer number, in a fancy wrapper. Its not a
>> magical object.

Reply via email to