On Wed, Jun 12, 2024 at 05:14:42PM -0700, Nick Harper wrote:
> On Wed, Jun 12, 2024 at 3:17 AM Dennis Jackson <i...@dennis-jackson.uk>
> wrote:
> 
> > You can't argue that T.E. contains the functionality of
> > certificate_authorities as a subset, then conclude that having additional
> > functionalities makes it less risky. You would need to argue the exact
> > opposite, that T.E. doesn't contain the bad functionalities of
> > certificate_authorities. The risk associated with abuse of a feature is not
> > in any way diluted by tacking on good use cases.
> 
> For the abuse scenario, TE makes it no easier than certificate_authorities
> (the size of advertising the single malicious CA isn't a concern, whereas
> it is a problem when it's a browser's entire trust store that's
> advertised), and TE adds additional deployment complexity compared to
> certificate_authorities, which lessens the risk.

Furthermore, due to how TLS works, client advertising malicious CA is
much bigger problem than server using malicious CA.


In TLS 1.3, Active attacker must commit to an attack after Client Hello.

- If attacker knows client "trusts" malicious CA, then attack has very
  low risk: Unless mTLS is used (which is very rare), the attack will be
  successful.

- Trying to attack server using malicious CA has much higher risk: In
  addition to not using mTLS, the server must pick CA with compromised
  keys. If server picks something with good keys, the attack fails in
  noisy way.


And in latter case, the attacker needs to coerce servers, which are
much more numerous than clients (in terms of entities).




-Ilari

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to