BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Why the dislike of X.509?
- Subject: [Discuss] Why the dislike of X.509?
- From: markw at mohawksoft.com (markw at mohawksoft.com)
- Date: Mon, 25 Aug 2014 15:11:50 -0400
- In-reply-to: <53FB7F0A.40105@gmail.com>
- References: <53F9F6B9.4060505@stephenadler.com> <20140824161132.GE14848@randomstring.org> <be314521ab6bebb6add54d706b042f01.squirrel@mail.mohawksoft.com> <53FA1C3B.70908@gmail.com> <53FB19E5.4080602@aeminium.org> <53FB4A5D.2030305@gmail.com> <CA+h9Qs5GnC6d1ejBQC=crtHwxoDiFWo4Kn+xjt0eiA8Kr733_A@mail.gmail.com> <53FB70E6.50706@gmail.com> <CA+h9Qs5THPNEir7tLZNjzLWMpod=9UGWTSCeZS2nCwVY0Ox=-w@mail.gmail.com> <53FB7F0A.40105@gmail.com>
> On 8/25/2014 1:57 PM, John Abreau wrote: >> So the problem is that in order to connect to your company's VPN, you're >> forced to trust the syadmin who administers the company's VPN server, >> since he controls the company's "centralized" CA root for the VPN >> server? > > More generally, even if the sysadmin is trustworthy there is no way for > me, the user, to know if someone else has obtained unauthorized access > to the escrow. Which is to say, I'm expected to blindly trust that the > system hasn't been compromised by bad actors without any proof at all > that this is the case. This is by definition the problem with all security. Every type of security, from bank vaults, hotel rooms, to vpns sufferer from people who don't protect the master keys. > > >> The part I don't get is the claim that OpenVPN is vulnerable because >> the public infrastructure that OpenVPN DOES NOT USE is vulnerable. > > Like I wrote before, it's not the publicness of the CA; it's the > centralness. Public or private, any CA is a single point of compromise > for its entire domain. *Any* security infrastructure is a central point of compromise. That's the nature of security. You are left with either an unmanageable mess or forced to use or create some sort of infrastructure to manage it. ANY security system is vulnerable to bad actors that can gain access to sensitive data. With a CA on openvpn, merely regenerate your master key and push a new cert. When users can't connect, they have to re-validate and obtain a new key. > > -- > Rich P. > _______________________________________________ > Discuss mailing list > Discuss at blu.org > http://lists.blu.org/mailman/listinfo/discuss >
- Follow-Ups:
- [Discuss] Why the dislike of X.509?
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] Why the dislike of X.509?
- References:
- [Discuss] vnc
- From: adler at stephenadler.com (Stephen Adler)
- [Discuss] vnc
- From: dsr at randomstring.org (Dan Ritter)
- [Discuss] vnc
- From: markw at mohawksoft.com (markw at mohawksoft.com)
- [Discuss] vnc
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] vnc
- From: nuno at aeminium.org (Nuno Sucena Almeida)
- [Discuss] Why the dislike of X.509?
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] Why the dislike of X.509?
- From: jabr at blu.org (John Abreau)
- [Discuss] Why the dislike of X.509?
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] Why the dislike of X.509?
- From: jabr at blu.org (John Abreau)
- [Discuss] Why the dislike of X.509?
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] vnc
- Prev by Date: [Discuss] Why the dislike of X.509?
- Next by Date: [Discuss] Why the dislike of X.509?
- Previous by thread: [Discuss] Why the dislike of X.509?
- Next by thread: [Discuss] Why the dislike of X.509?
- Index(es):