[Info-vax] [OT] Zero trust software, was: Re: Rethinking DECNET ?
Bill Gunshannon
bill at server3.cs.scranton.edu
Wed Sep 3 08:38:49 EDT 2014
In article <lu5gu3$uvg$1 at dont-email.me>,
Stephen Hoffman <seaohveh at hoffmanlabs.invalid> writes:
> On 2014-09-02 21:44:02 +0000, David Froble said:
>
>> Bill Gunshannon wrote:
>>
>>> Remember reading about how VeriSign gave keys to the NSA? I remember
>>> asking people over 10 years ago why I, or anyone, should trust their
>>> certificates over self-signed ones.
>>
>> We're using self generated certificates at our customer sites. I don't
>> know why, since I don't get along very well with certificates. Also
>> don't know why not.
>>
>> What are the advantages, and disadvantages, of using purchased
>> certificates vs the ones you can generate yourself?
>
> The salient advantage of a purchased certificate over a self-generated
> certificate chain is that you do not need a trusted path to load the
> root certificate into the client devices; the root certificates are
> pre-loaded by the folks that provided the operating system or the web
> browser or related tools.
And that is supposed to give me the confidence to trust them?
>
> This trusted path might be physical possession of the device when you
> manually load the certificate. An untrusted path can be a remote
> network access or a certificate you've mailed out, where you're not
> really sure which server you're actually loading the root certificate
> from. (Yes, you could digitally sign the mail and some receivers might
> verify the signature, but eventually there's a trusted certificate or
> physical access somewhere...)
Trusted in what way? VeriSign gave the keys to a third-party.
>
> Whether with a commercial certificate or with a private certificate or
> private root certificate authority and private signing chain, you don't
> want the end-user to load and trust a rogue certificate, or trusting a
> rogue root certificate.
And what do you call a certificate that's keys have been provided freely
to a third-party?
>
> If you've ever looked in the root certificate lists for various
> packages, there can be 500 or 600 different entities from all over the
> place, and your client will trust the certificates issued by any of
> them, as well as the certificates issued by their partners.
And my point is: Why on earth should I trust them?
>
> In terms of what is happening with a private certificate authority
> versus a commercial authority â and once that root certificate is
> loaded into the client, either by the vendor or by a trusted load by
> the local site â the provided security is the same. Purchased and
> private certificates of the same key length provide the same security.
My private certificates provide much more security because I can be
certain I haven't given them to any third parties.
>
> With a private certificate chain, you're the only source of matching
> certificates,
Unless the certificate authority has given them to a third party. And
worse still, done it without your knowledge while you were happily working
under the assumption that your communications are secure.
> and it's cryptographically exceedingly difficult to forge
> keys, and you don't have to pay for the certificates you need â well,
> you pay for them based on the overhead of generating the certificates
> and keeping the root certificate private key, well, private.
And you trust that they will, in fact, be kept private? Reality does
not agree with you.
>
> The folks maintaining a private chain do need to keep their signing key
> private, as do the commercial providers, and you don't want either
> bunch to generate untrusted certificates. If a certificate provider is
> compromised for whatever reason, or if the root certificate private key
> of a self-signed certificate authority is compromised, then you end up
> reissuing certificates. Possibly also dealing with certificate
> revocations, but these revocation checks tend to be problematic at best.
Unless the certificate was deliberately compromised and the authority
isn't going to re-issue it or even tell you that they compromised it
deliberately.
>
> There are some interesting discussions around revocation, certificate
> pinning, and verifying that the certificate matches the server you've
> connected to â this irrespective of whether it's a commercial
> certificate or a certificate signed by a private self-signed
> certificate authority.
>
> Note: OpenVMS does not have a list of root certificate authorities
> pre-installed. Just the one HP certificate. (The Mozilla web
> browsers for VMS do have certificate stores.)
>
> Some VMS-related certificate-related reading:
> <http://labs.hoffmanlabs.com/node/1853>
All of this come down to trust. And my opinion has always been why would
anyone trust a third party over themselves? Maybe it is time to re-publish
Ken Thompson's Turing Award reception talk.
bill
--
Bill Gunshannon | de-moc-ra-cy (di mok' ra see) n. Three wolves
billg999 at cs.scranton.edu | and a sheep voting on what's for dinner.
University of Scranton |
Scranton, Pennsylvania | #include <std.disclaimer.h>
More information about the Info-vax
mailing list