On Tuesday, April 14, 2015 at 5:39:24 AM UTC-7, Gervase Markham wrote:
> On 14/04/15 01:57, northrupt...@gmail.com wrote:
> > * Less scary warnings about self-signed certificates (i.e. treat
> > HTTPS+selfsigned like we do with HTTP now, and treat HTTP like we do
> > with HTTPS+selfsigned now); the fact that self-signed HTTPS is
> > treated as less secure than HTTP is - to put this as politely and
> > gently as possible - a pile of bovine manure 
> 
> http://gerv.net/security/self-signed-certs/ , section 3.

That whole article is just additional shovelfuls of bovine manure slopped onto 
the existing heap.

The article assumes that when folks connect to something via SSH and something 
changes - causing MITM-attack warnings and a refusal to connect - folks default 
to just removing the existing entry in ~/.ssh/known_hosts without actually 
questioning anything.  This conveniently ignores the fact that - when people do 
this - it's because they already know there's been a change (usually due to a 
server replacement); most folks (that I've encountered at least) *will* stop 
and think before editing their known_hosts if it's an unexpected change.

"The first important thing to note about this model is that key changes are an 
expected part of life."

Only if they've been communicated first.  In the vast majority of SSH 
deployments, a host key will exist at least as long as the host does (if not 
longer).  If one is going to criticize SSH's model, one should, you know, 
actually freaking understand it first.

"You can't provide [Joe Public] with a string of hex characters and expect it 
to read it over the phone to his bank."

Sure you can.  Joe Public *already* has to do this with social security 
numbers, credit card numbers, checking/savings account numbers, etc. on a 
pretty routine basis, whether it's over the phone, over the Internet, by mail, 
in person, or what have you.  What makes an SSH fingerprint any different?  The 
fact that now you have the letters A through F to read?  Please.

"Everyone can [install a custom root certificate] manually or the IT department 
can use the Client Customizability Kit (CCK) to make a custom Firefox. "

I've used the CCK in the past for Firefox customizations in enterprise 
settings.  It's a royal pain in the ass, and is not nearly as viable a solution 
as the article suggests (and the alternate suggestion of "oh just use the 
broken, arbitrarily-trusted CA system for your internal certs!" is a hilarious 
joke at best; the author of the article would do better as a comedian than as a 
serious authority when it comes to security best practices).

A better solution might be to do this on a client workstation level, but it's 
still a pain and usually not worth the trouble for smaller enterprises v. just 
sticking to the self-signed cert.

The article, meanwhile, also assumes (in the section before the one you've 
cited) that the CA system is immune to being compromised while DNS is 
vulnerable.  Anyone with a number of brain cells greater than or equal to one 
should know better than to take that assumption at face value.

> 
> But also, Firefox is implementing opportunistic encryption, which AIUI
> gives you a lot of what you want here.
> 
> Gerv

Then that needs to happen first.  Otherwise, this whole discussion is moot, 
since absolutely nobody in their right mind would want to be shoehorned into 
our current broken CA system without at least *some* alternative.
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to