If there's a non-EV CA that would give you a cert for DNS name amazon.com - I'd 
like to make sure it's in my list and marked Not Trusted.

Regards,
Uri

Sent from my iPhone

> On Dec 7, 2018, at 17:02, Kyle Hamilton <aerow...@gmail.com> wrote:
> 
> CAs *do* verify the attributes they certify.  That they're not presented as 
> such is not the fault of the CAs, but rather of the browsers who insist on 
> not changing or improving their UI.
> 
> The thing is, if I run a website with a forum that I don't ask for money on 
> and don't want any transactions happening on, why should I have to pay for 
> the same level of certainty of my identity that a company like Amazon needs?
> 
> (Why does Amazon need that much certainty? Well, I could set up wireless 
> access points around coffee shops in December, point the DNS provided at 
> those WAPs to my own server and run a fake amazon.com site to capture account 
> credentials and credit cards. Without EV, that's a plausible attack. 
> Especially with SSL being not-by-default, someone could type amazon.com and 
> it can be intercepted without showing any certificate warning -- which then 
> allows a redirect to a lookalike amazon.com name that could get certified by 
> something like LetsEncrypt.)
> 
> Plus, clouds have had a protocol available for doing queries to certs and 
> keys held by other parties for several years. Cloudflare developed this 
> protocol for banks, for whom loss of control of the certificate key is a 
> reportable event, but who also often need DDoS protection. There's no reason 
> it can't be extended to other clouds and sites -- unless Cloudflare patented 
> it and wants royalties, in which case their rent-seeking is destroying the 
> security of the web by convincing cloud salesmen to say that EV is too much 
> trouble to deal with and thus should be killed off in the marketplace.
> 
> Demanding that EV be perfect and dropping support for it if it has any found 
> vulnerability falls into a class of human behavior known as "letting the 
> perfect be the enemy of the good", which is also known as "cutting off the 
> nose to spite the face".  It still cuts down on a huge number of potential 
> attacks, and doing away with it allows those attacks to flourish again. 
> (Which, by the way, is what organized crime would prefer to permit.)
> 
> -Kyle H
> 
> 
>> On Thu, Dec 6, 2018, 14:07 Blumenthal, Uri - 0553 - MITLL <u...@ll.mit.edu 
>> wrote:
>> >    > Quoting from Peter Gutmann's "Engineering Security",
>> >    > section "EV Certificates: PKI-me-Harder"
>> >    >
>> >    >      Indeed, cynics would say that this was exactly the problem that
>> >    >      certificates and CAs were supposed to solve in the first place, 
>> > and
>> >    >      that “high-assurance” certificates are just a way of charging a
>> >    >      second time for an existing service.
>> >    
>> >    Peter Gutman, for all his talents, dislikes PKI with a vengeance.
>> >     EV is a standard for OV certificates done right.  Which involves more
>> >    thorough identity checks, stricter rules for the CAs to follow etc.
>> >  
>> >     The real point of EV certificates is to separate CAs that do a good
>> >    job from those that do a more sloppy job, without completely distrusting
>> >    the mediocre CA operations.
>> 
>> So, a CA that's supposed to validate its customer before issuing a 
>> certificate, may do a "more sloppy job" if he doesn't cough up some extra 
>> money.
>> 
>> I think Peter is exactly right here. CA either do their job, or they don't. 
>> If they agree to certify a set of attributes, they ought to verify each one 
>> of them.
>> 
>> 
>> -- 
>> openssl-users mailing list
>> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
>> 
> -- 
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Attachment: smime.p7s
Description: S/MIME cryptographic signature

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to