Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On 06/14/2011 09:37 AM, Edward Ned Harvey wrote: >> From: Derek Martin [mailto:invalid-yPs96gJSFQo51KKgMmcfiw at public.gmane.org] >> Sent: Monday, June 13, 2011 3:35 PM >> >> If you don't take the time to actually verify BOTH the identity of the >> person sending you messages, and the secret they've given you, then >> you're right, there's no difference. Both are worthless, beyond >> keeping casual prying eyes from seeing your conversation... you >> never really know for sure that you're communicating with the person >> you think you are at the time. > > You're saying, that because the OS "trusts" a list of root CA's, then > anybody who can infiltrate or circumvent security measures of any of those > CA's can forge communications on behalf of anyone. > > True. You can only trust S/MIME signing/encryption as much as you trust the > procedures of the root CA's. Right, and there are two problems with that: 1) the list of root CA's that are trusted by default (e.g. by firefox), is quite long 2) /Any/ root CA getting compromised leads to the potential for /all/ communications to be compromised via man-in-the-middle attacks. #2 isn't a problem with the S/MIME methodology in general, it's a problem with how applications do their CA checking. No application that I know of allows you to say "trust this CA only for these domains". This IMHO would make a lot of sense for email certificates, but it would be very problematic for normal webserver certificates (to much burden on the end-user). > For the KGB or CIA, certainly SSL CA trust would not be acceptable. If you frame the problem a little differently, it isn't true that SSL isn't good enough for the gov't. US DoD is a huge user of X509 certificates. Here's the rub: they have their own CAs. If you use your own CAs and don't use the 'standard' root CAs that get distributed w/ firefox et al, then SSL and S/MIME can be as trustworthy as your own CAs.
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |