[145420] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A mighty fortress is our PKI

daemon@ATHENA.MIT.EDU (Paul Tiemann)
Tue Jul 27 23:11:56 2010

From: Paul Tiemann <paul.tiemann.usenet@gmail.com>
In-Reply-To: <E1OdksF-0003ua-ID@wintermute02.cs.auckland.ac.nz>
Date: Tue, 27 Jul 2010 19:06:28 -0600
Cc: cryptography@metzdowd.com
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>

Hi Peter,

> I actually
> agree with a lot of the points made in the response, since this wasn't =
a
> failing of Edgecast or a CA but a problem in the way SSL's PKI (or =
more
> generally just PKI as a whole) works. =20

Yes.  SNI could have been included from the start, but it was probably =
hard enough back then to get SSL 1.0 or SSL 2.0 out the door.  It's =
difficult for a CA to push new SSL extensions if SSL clients aren't =
ready for what's new.

> Because it was designed for the
> purposes of authenticating a single user to the global X.500 directory =
it
> really doesn't have any provision for Sybil certs (I'm going to keep =
calling
> them that because we need some sort of label for them :-).

Agreed.  PKI was designed in a time when IPv4 space was a lot more =
plentiful too, and few had even dreamt of serving from multiple =
locations via anycast.  A lot of the time (for good or bad) new =
pressures form around a problem and people invent new ways of using old =
things.  It's often easier to reuse an older well supported feature of =
BGP, TCP or even SSL than to go invent something wonderful and new and =
then wait years for the world to catch up (think SNI.)

The designers of PKI couldn't foresee all possible future uses, and =
implementation wasn't perfect from the start.  It wasn't until 2007 that =
the "Subject Alternative Name" started to see mass adoption, and that =
was due mainly to Microsoft pushing for it (they had supported it since =
Windows 95!) which ought to be considered a good thing.

I won't object to 'Sybil' as long as it's understood to mean =
multi-personality and not deception.

> The intent with posting it to the list was to get input from a =
collection of
> crypto-savvy people on what could be done. =20

I'll admit that at first it appeared to have been posted as something to =
be laughed at.  After reading Perry's recommended Orwell essay, I'm =
willing to admit that laughing at things can be a way to effect change. =20=


> The issue had previously been
> discussed on a (very small) private list, and one of the members =
suggested I
> post it to the cryptography list to get more input from people.  The =
follow-up
> message (the "Part II" one) is in a similar vein, a summary of a =
problem and
> then some starters for a discussion on what the issues might be.

Part II was nice.  Shocking and full of thought provoking questions too.

> For example should an
> SSL cert be held to higher standards than the server it's hosted on?  =
In other
> words if it's easier to compromise a CDN host or (far more likely) a =
web app
> on it, does it matter if you're using a Sybil cert?  I have no idea, =
and I'm
> open to arguments for and against.

My technical contention is that it's generally going to be harder to =
compromise an origin caching CDN host because they do not run any web =
app code at all:

Pseudo code for a CDN http daemon:

init
while 1:
	read a request
	if already cached: serve the request from cache
	else: fetch from origin, save to cache if cacheable, and serve

If running PHP/ASP/Java/etc then those bets are off, but a CDNs don't do =
this.  Many CDNs just serve up static (non-origin cached, no POST =
support) sites.

>> I've spoken with my contacts at Edgecast, and they expressed that =
they're
>> very willing to consider alternate approaches.
>=20
> I'm not actually sure what the "fix" would be for this, or even if =
there is a
> fix that needs to be made.  Thus the hope to get it discussed on the =
list.

Well, if nothing else, the smaller certificates might at least help =
whatever PKI library was getting the segv.

Paul Tiemann
(DigiCert)

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post