I changed the subject.
Also, while this fork is not specifically a mainframe topic, it's really important, and most of us will have it thrown in our face, even as mainframers.


On 8/29/23 15:29, Grant Taylor wrote:
On 8/29/23 10:46 AM, Charles Mills wrote:
Don't want to get into one of the peeing contests that have become all too common here.

Neither do I.

I do want to have a polite and professional discussion about what things are capable of.

Hopefully I'll learn things from you -- I usually do.  :-D  Maybe, if I'm very lucky, I'll teach you something.  :-)


Same here.
And I confess to being contrarian.
I relish butting heads with Alan Altmark over things like MAC vs DAC. (It's not for the head butt, which hurts, but for sake of digging down to the foundation.)



Let me just say that never mind any enterprise PKI CA constraints, I think Tom was talking about OpenSSL on a PC.

Why elide what is a very germane safety component?  That being restricting what a given CA is allowed to sign?

OpenSSL stores private keys -- private keys -- in a pretty accessible format.


The *format* really doesn't bother me, other than w/r/t processability.

It's true that complicated access methods will slow down an attacker. Problem is they also slow down legitimate work, and that effect is multiplied. (Attacker only needs to succeed once; the good guy must succeed time after time after time.)



OpenSSL /can/ store the private key in a file.

OpenSSL /can/ /also/ depend something like a YubiKey to store the private key.

If I can get into Tom's PC -- perhaps while he is at lunch, or with a clever phish -- and get that private key, then I can generate server certificates for any site in the world and Tom's associates will trust those certificates.

Maybe, maybe not.  It will depend if the private key is password protected or not.  If there is a password, it won't be a walk up and sign without knowing the password.

Not criticizing Tom or his processes here. Just pointing out to readers that there are some significant risks in general to the approach of "oh, I will just create an ad hoc CA and have my users trust it."


I agree it's not effective for everyone to run their own CA. But for purpose of education, a "live" in-house CA comes in handy.



I agree that there are risks.

It's a question of which is more risky long term:

1)  training users to click past certificate warnings
2)  the potential for someone to abuse Tom's CA which is constrained to the enterprise domain name and has a hardware token (YubiKey)?

It's all about the lesser of the evils.


YES

And making it harder (more expensive) for the attacker (relative to his ROI).



Trusting a CA is implicitly trusting everything that anyone does with its root private key.

That's where a constrained CA / root key comes into play.

Trusting the key to sign *. is very bad.

Trusting the key to sign *.example.com, not so much so. Especially if example.com is a private internal domain not possible to use in the real world.

Yes, it is no different in some ways than trusting DigiCert. The difference is that DigiCert has very rigorous protocols for protecting its root private keys. OpenSSL does not.

It's possible for Tom, et al., to make reasonable approximations of what DigiCert, et al., are doing.  If Tom's company wanted to, they can purchase a more professional Hardware Security Module (HSM) that can get quite close to what more professional entities do if they so choose.

But using something like a YubiKey to hold the root key of for an enterprise CA constrained to the internal domain is probably reasonably safe.  Especially if said YubiKey is used to sign an intermediate certificatte -- like the big kids do -- and storing said YubiKey disconnected, in a safe in between uses once a quarter.  Especially if the system that does the signing is disconnected from the network.


I've been simmering a blog post about MFA since GitHub pressed the issue recently. YubiKey is part of that because it can become a new single point of failure. In all of this, one of the biggest overlooked thingies is new points of failure. We forget that locking out bad guys kinda sucks for US when WE suddenly look like one of the bad guys. (Machines cannot tell the difference.)

This is not a slam on YubiKey.
It's an observation that our systems need failover factors and most developers still don't think about that.



I think it's well within reason for individuals, and especially businesses to fairly safely have an (Enterprise) CA that is constrained to their organization.



Grant. . . .

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


-- R; <><

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to