On Tue, Oct 16, 2018 at 11:00 AM Rene 'Renne' Bartsch, B.Sc. Informatics <ietf=40bartschnet...@dmarc.ietf.org> wrote:
> I haven't found the article with 150,- $, yet, but this isn't good either: > > > https://www.bankinfosecurity.com/study-finds-custom-market-for-bogus-tls-certificates-a-10680 > > and Mozilla makes it worse: > > > https://blog.mozilla.org/security/2018/10/10/delaying-further-symantec-tls-certificate-distrust/ I'm afraid that taking that article and extrapolating that it undermines SSL is, unfortunately, a bit unsupported. It's certainly true that "bad actors" are able to misrepresent and circumvent a number of CAs' "Extended Validation" practices. This can range from CAs using unreliable datasources (like Dun & Bradstreet) or to CAs having poor practices regarding acceptable documentation. However, in the examples mentioned in that article (and related, as I recall when that came out), the attack is not that the attacker bypasses the domain name verification process. Instead, the attacker fully controls their own domain name, and they fool the CA into providing additional assertions about that domain name that aren't legitimate - such as what company or entity is operating that domain name. The same applies for EV Code Signing certificates (which aren't bound to domains, but organizations) - by fooling the organization vetting process, systems that rely on the organization information - not the domain name - are the ones put at risk. DANE/DNSSEC would not address that concern, because its largely orthogonal to such extended validation. Indeed, what DANE/DNSSEC would address is exactly the thing that's working and not been compromised - the domain validation part (especially in light of CAA). If your goal is to minimize risk, then I think a key takeaways would be not to rely on organization information in certificates - and instead focus on the domain name. Similarly, rather than promoting DANE/DNSSEC in browsers, you could encourage browsers to adopt solutions like Apple has done in Safari on macOS Mojave - no longer present extended validation UI to users ( https://www.troyhunt.com/extended-validation-certificates-are-dead/ ), so that they can instead reliably use the domain name.
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls