BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] root CA bloat
- Subject: [Discuss] root CA bloat
- From: bogstad at pobox.com (Bill Bogstad)
- Date: Sat, 22 Nov 2014 22:15:12 +0100
- In-reply-to: <5470A912.2080801@gmail.com>
- References: <546C4823.6060900@gmail.com> <BN3PR0401MB1204BAB10AE6249C54E4E81BDC760@BN3PR0401MB1204.namprd04.prod.outlook.com> <546D7B55.70903@gmail.com> <BN3PR0401MB1204E9F1CF304F6724855281DC760@BN3PR0401MB1204.namprd04.prod.outlook.com> <546FC87F.1090203@gmail.com> <546FE733.8070007@gmail.com> <CAJFsZ=pXgxcG5zeD=zg+us8uanYgRGEcToYAjuwekH7+K980Yg@mail.gmail.com> <5470A912.2080801@gmail.com>
On Sat, Nov 22, 2014 at 4:17 PM, Richard Pieri <richard.pieri at gmail.com> wrote: > On 11/22/2014 5:33 AM, Bill Bogstad wrote: >> >> You are conflating DNS and Certificate Authorities. When I look at >> the certificate used >> for www.microsoft.com, it appears to be signed by Symantec via >> Verisign. In any case, controlling someone's DNS is not the same >> thing as being able to sign an SSL certificate that will be accepted. > > > MarkMonitor is a trusted CA. If they generate a certificate for > microsoft.com then your browser will trust it. MarkMonitor is authoritative > for the microsoft.com domain. They can change all microsoft.com hosts to > point to their servers and you will trust them because their DNSSEC > signatures are good and valid. I already mentioned part of this in my first note. They would have to do it by changing the nameserver entries for the microsoft.com domain at the .com DNS servers which I'm pretty sure they don't run. This would be visible to the whole world. So yes, they could do this; but I'm pretty sure it would be found out because the bad data would be sitting in everybody's caching servers as well as the databases at the .com servers which are run by multiple organizations. I'm pretty sure they would then lose every customer they had within a few days or weeks. This is not a scenario that I'm going to lose sleep over. If you have some other scenario that doesn't involve putting MarkMonitor out of business please provide details. Bill
- Follow-Ups:
- [Discuss] root CA bloat
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] root CA bloat
- References:
- [Discuss] free SSL certs from the EFF
- From: tmetro+blu at gmail.com (Tom Metro)
- [Discuss] free SSL certs from the EFF
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] free SSL certs from the EFF
- From: tmetro+blu at gmail.com (Tom Metro)
- [Discuss] free SSL certs from the EFF
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] root CA bloat
- From: tmetro+blu at gmail.com (Tom Metro)
- [Discuss] root CA bloat
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] root CA bloat
- From: bogstad at pobox.com (Bill Bogstad)
- [Discuss] root CA bloat
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] free SSL certs from the EFF
- Prev by Date: [Discuss] root CA bloat
- Next by Date: [Discuss] root CA bloat
- Previous by thread: [Discuss] root CA bloat
- Next by thread: [Discuss] root CA bloat
- Index(es):