Re: OpenSSL handling intermediate certificates

2012-08-28 Thread Kevin Chadwick
On Fri, 24 Aug 2012 23:51:27 -0400 Ryan Kirk wrote: > You're definitely on track, although I was referring to D.J. > Bernstein's recent slides: http://cr.yp.to/talks/2012.06.04/slides.pdf > Thanks, I'll take a gander. > In these, he does bring up the same problems again that his DNSCURVE > purp

Re: OpenSSL handling intermediate certificates

2012-08-24 Thread Ryan Kirk
You're definitely on track, although I was referring to D.J. Bernstein's recent slides: http://cr.yp.to/talks/2012.06.04/slides.pdf In these, he does bring up the same problems again that his DNSCURVE purported to solve, about weak algorithms, signing (or lack of), forgeries, and UDP amplification

Re: OpenSSL handling intermediate certificates

2012-08-24 Thread Kevin Chadwick
> However, > this would require DNSSEC to be secure (which itself seems to be mired > in controvery lately, not to mention the slow rate of adoption) Do you have a reference for that. I know of the controversy around DNSCURVE before DNSSEC even arrived but haven't seen any of late. Is it to do wit

Re: OpenSSL handling intermediate certificates

2012-08-23 Thread Florian Obser
On 08/23/12 20:05, Ted Unangst wrote: > On Thu, Aug 23, 2012 at 13:12, Ryan Kirk wrote: >> One thing I've never understood is that if you're MITM'd, what good is >> a cert revocation going to do? The proxying individual can easily >> block access to the revocation lists, and your browser be none th

Re: OpenSSL handling intermediate certificates

2012-08-23 Thread Ted Unangst
On Thu, Aug 23, 2012 at 13:12, Ryan Kirk wrote: > One thing I've never understood is that if you're MITM'd, what good is > a cert revocation going to do? The proxying individual can easily > block access to the revocation lists, and your browser be none the > wiser. hahaha, I've seen exactly one p

Re: OpenSSL handling intermediate certificates

2012-08-23 Thread Ryan Kirk
On Thu, Aug 23, 2012 at 12:08 PM, Ted Unangst wrote: people designing the protocol never got that far. > > Anyway the workaround du jour is certificate pinning. Your browser is > supposed to remember the cert used for the previous connection and > warn if it changes, which reduces the window of o

Re: OpenSSL handling intermediate certificates

2012-08-23 Thread Ted Unangst
On Thu, Aug 23, 2012 at 01:37, Justin N. Lindberg wrote: > So why isn't there a good way for an end user to strictly limit trust > in, for example, a "Google Internet Authority" to those domains that > are actually owned by Google, and conversely, not to trust any other > authority to sign certs

Re: OpenSSL handling intermediate certificates

2012-08-23 Thread Justin N. Lindberg
On Sun, 12 Aug 2012 13:29:57 -0400 Nico Kadel-Garcia wrote: > Such certificates have already been stolen. They're dependent on the > security of the intermediate key owners, and the are demonstrably > unsecure: Check this URL for more details on the release of rogue SSL > signing certificates thr

Re: OpenSSL handling intermediate certificates

2012-08-12 Thread Nico Kadel-Garcia
On Thu, Aug 9, 2012 at 3:22 PM, Justin N. Lindberg wrote: > On Thu, 09 Aug 2012 09:18:00 +0200 > Moritz Grimm wrote: > >> You always put trust into the whole chain (that's why you need >> intermediate certs in the first place), starting with your trusted >> root. If that trust turns out to be mis

Re: OpenSSL handling intermediate certificates

2012-08-09 Thread Justin N. Lindberg
On Thu, 09 Aug 2012 09:18:00 +0200 Moritz Grimm wrote: > You always put trust into the whole chain (that's why you need > intermediate certs in the first place), starting with your trusted > root. If that trust turns out to be misplaced in any one of the > components (root, intermediate, server),

Re: OpenSSL handling intermediate certificates

2012-08-09 Thread Moritz Grimm
Moved from tech@ to misc@ ... On 08/09/12 06:27, Justin N. Lindberg wrote: > I do believe this would allow me as a client to validate certs signed > by the intermediate certs with no problem, and in fact I seem to recall > actually doing the same thing before with self-signed certs for my own > u