W dniu 26.01.2015 o 19:20, Phillip Hallam-Baker pisze:
> What is the attack model here? What form of attack is unacceptable?
> 
> We have a request for a cert for www.example.com <http://www.example.com> to
> Alice-Cert. What attacks do we consider problems?
> 
> 1) The holder of www.example.com <http://www.example.com> did not authorize 
> any
> cert binding to that private key.
> 
> 2) The holder of www.example.com <http://www.example.com> authorized a cert 
> for
> that key but it was for Bob-Cert.
> 
> 3) The holder of www.example.com <http://www.example.com> thinks they are
> connecting to Alice-cert but they are actually connecting to Mallet-Cert.
> 
> 
> (1) is very clear problem but (2) is not unless there is an application that
> makes use of the certificate without a private key or vice versa. (3) is going
> to be trivially solved by checking the issued cert chain.
> 
> TLS does not permit certificate substitution attacks.
I was thinking about some publicly unknown vulnerability in TLS or its
implementations. So (3) above.


> Binding every communication to a private signing key held by the applicant is 
> a
> good idea. Requiring that to be the private key in the cert is a very bad one.
> Not least because once we stop using RSA, encryption keys and signature keys
> become two different algorithms and there are good privacy reasons to prefer a
> key agreement based on encryption and an ephemeral rather than signature and 
> an
> ephemeral.

I'm sorry, but I don't understand the above paragraph (most importantly, its
context). What are You responding to?


Greetings,
Mateusz

_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to