Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Privacy Security Your Rights Online

Are Some CAs Too Big To Fail? 163

Trailrunner7 writes "In the wake of this weekend's revelations of the seriousness of the attack on certificate authority DigiNotar, security experts have renewed criticism of the Internet's digital certificate infrastructure, with some wondering if larger certificate authorities (CAs) might be too big to fail. Would Mozilla and Microsoft and Google have revoked trust in root certificates from VeriSign or Thawte had they been compromised? Unlikely. 'It's not a simple matter of removing certificates from a database, because they're not in any databases,' says researcher Moxie Marlinspike, who presented an alternative approach to the current SSL infrastructure last month at DEFCON. 'We may never track them all down.'"
This discussion has been archived. No new comments can be posted.

Are Some CAs Too Big To Fail?

Comments Filter:
  • Notary Servers (Score:1, Interesting)

    by slackergod ( 37906 ) on Wednesday September 07, 2011 @04:16PM (#37332102) Homepage Journal

    Just to provide some links to the "alternative approach" mentioned in the summary:

    * The Perspectives Project [perspectives-project.org] spearheaded the concept of independant notary servers instead of a chain-of-trust.

    * Convergence [convergence.io] is another spin on the same concept, by Moxie Marlinspike in fact. (Not sure if it's compatible w/ Perspectives, but I think it is)

  • Good point (Score:4, Interesting)

    by houstonbofh ( 602064 ) on Wednesday September 07, 2011 @04:24PM (#37332228)
    Time for a new plug in. Cert Blocker Plus. Automatically updates with a list of certs know to be compromised, questionable, run by governments, or members of the opposing party. :) (Actually, I can see this coming out soon, and if someone patents this, I call prior art!)
  • Re:User ignorance (Score:4, Interesting)

    by jellomizer ( 103300 ) on Wednesday September 07, 2011 @04:25PM (#37332244)

    The problem with CAs are that they never really do their job quite well. If you are paying hundreds or thousands of dollars for a Cert they really should do a lot more work to verify who you are and the browser should identify the level of security the Cert gives.
    A cheap level (Under $50 per IP) for those B2B type of apps where you are connecting to a trusted source anyways but you don't want the error message or tell your customer to setup something new. A one note should suffice. Then you got a level good for online business (Under $500) this is for online stores, the CA needs to determine that it is a real store with the ability to sell the goods. However the browser should alert when ever there is a data stream that looks like a social security number or pushes a request for such non-merchant information. then you got the premium HIPAA level cert where it the CA needs to keep a close eye on its organization make sure the companies security is strong enough for the CERT this would be a full allow for the browser.

  • by AceJohnny ( 253840 ) <jlargentaye&gmail,com> on Wednesday September 07, 2011 @04:29PM (#37332310) Journal

    Marlinspike's approach, implemented in a Firefox extension [convergence.io] presented at DefCon '11, is to do away with the notion of CAs altogether in SSL, replacing it with a distributed network that reports on the certificate they see. Basically, if the certificate you see agrees with the rest of the network, then you're not being spoofed.

    He had previously explained [thoughtcrime.org] the properties a replacement to the CA system had to demonstrate in order to be viable

  • by vadim_t ( 324782 ) on Wednesday September 07, 2011 @06:14PM (#37333708) Homepage

    So I've seen quite a few people wanting a switch to self-signed certs (who IMO mostly don't understand what making that secure actually involves), and an idea to check certs from different network paths (which doesn't work if your only path is compromised, and how do you secure the communication to the service that does the check for you?).

    So here's an alternative idea: Require multiple CAs.

    Instead of doing it the "extended validation" way which is more money for not a whole lot more service from the same provider, it'd be much better to have multiple CA signatures on a single cert.

    Compromising multiple CAs in the same timeframe to create a cert would be considerably harder than creating one. More importantly, it'd make revoking large CAs much easier.

    Let's say that the new norm is to have a site's cert is signed by 5 different CAs, and that the minimum acceptable amount is 3 signatures.

    Then, if Verisign gets compromised there's no problem with pulling their cert: you're down to 4 valid signatures on your certificate, which is still fine. That should put considerably more pressure on CAs to perform better.

    Even Verisign wouldn't be able to trust that their security problems would be let go due to their popularity, as even the largest CAs would be completely expendable without the end users needing to care much. The site would just go with a different 5th CA to return back to the full strength.

Ya'll hear about the geometer who went to the beach to catch some rays and became a tangent ?

Working...