Re: [cryptography] How much does it cost to start a root CA ?

2013-01-05 Thread John Case


Jon,

Many thanks for this very informative post - really appreciated.

Some comments, below...


On Sat, 5 Jan 2013, Jon Callas wrote:

Now that $250K that I spent got an offline root CA and an intermediate 
online CA. The intermediate was not capable of supporting workloads that 
would make you a major business. You need a data center after that, that 
supports the workloads that your business requires. But of course, you 
can grow that with your customer workload, and you can buy the 
datacenter space you need.



You're the second person in this thread to mention hardware and datacenter 
costs ... and while I don't want to drift too far into a blood and guts 
sysadmin rundown, I am curious...  Are you talking about the customer 
facing, retail side of things with the webservers and the load balancers 
and all of the things that make a robust web presence or are you talking 
strictly the x.509 components ?


Because it seems to me (naive ?) that even a very high volume x.509 
signing operation is ... maybe a pair of good 1u servers and a rack at a 
decent (sas70/pci/blah/blah) datacenter ... ?  Ok, a firewall and maybe 
some IDS system ... but we're still only a handful of 1u boxes and a 
quarter of a rack...


Perhaps it's this kind of thinking that leads to failed audits :)


There are rumors, which you've read here about how there are lots of 
underhanded obstacles in the way of becoming a CA. My experience is that 
the only underhanded part of the industry is that no one in it dispels 
the rumors that there are underhanded obstacles in your path. This is 
pretty much the first time I have, so I suppose I'm as guilty as anyone 
else.



That's nice to know, and I'm heartened that all the way into 2012 this is 
still the case, but ... boy oh boy does this look and smell like a 
marketplace ripe for monopolization and a cartel ... it's almost a classic 
case.


I think the presence of a major browser that is a community, independent 
effort is an interesting wrinkle, and the fickleness of the browsing 
public (how fast did chrome shoot up the charts ?  Safari ?) adds a 
wrinkle too, but ... there's no way the large, entrenched players aren't 
sitting around thinking gee we have a nice thing going here...  Not a 
conspiracy theory, just common sense...


Thanks again for a really thougt-provoking post.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] How much does it cost to start a root CA ?

2013-01-04 Thread John Case


Let's assume hardware is zero ... it's a really variable cost, so I assume 
(correct me if I'm wrong) that it is a trivial cost compared to legal and 
audit costs, etc.


So what does it cost to start a root CA, get properly audited (as I see 
the root CAs are) and get yourself included into, say, firefox or chrome ?


A followup question would be:

Is inclusion of a root CA in the major browsers a shall issue process ? 
hat is, you meet the criteria and you get in ?  Or is it a subjective, 
political process ?


Finally, it seems to me that since there re so few root CAs (~30 ?) and 
the service provided is such an arbitrary, misunderstood one, that 
existing CAs would be actively trying to prevent new entrants ... and 
establish themsevles as toll collectors with a pseudo monopoly ... what 
evidence (if any) do we have that they are pursuing such an ecosystem ?


Thank you.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] How much does it cost to start a root CA ?

2013-01-04 Thread John Case


On Fri, 4 Jan 2013, yersinia wrote:


Finally, it seems to me that since there re so few root CAs (~30 ?) and the
service provided is such an arbitrary, misunderstood one, that existing CAs
would be actively trying to prevent new entrants ... and establish
themsevles as toll collectors with a pseudo monopoly ... what evidence (if
any) do we have that they are pursuing such an ecosystem ?


Many today say that there are too many root CA, not a few. Is not it?
https://www.eff.org/observatory.



Maybe.  That's outside the scope of the questions I asked, though - I'm 
just interested in how difficult it is currently to start one, and what 
barriers the incumbents are putting into place...

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] How much does it cost to start a root CA ?

2013-01-04 Thread John Case


On Fri, 4 Jan 2013, Greg Rose wrote:

You could ask the folks at CAcert... I imagine Ian Grigg will also chime 
in. Certification costs a lot, and as you have observed, the incumbents 
try very hard to keep you out. Despite some reasonable sources of 
funding, CAcert still didn't succeed.



Well, I actually have not observed that, I just *assumed* it to be the 
case based on my general understanding of markets, etc.


So it appears that was a good assumption.  I would indeed like to hear 
about how the incumbents protect this turf and to what degree they are 
doing so ...

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] The NSA and secure VoIP

2012-03-01 Thread John Case


On Thu, 1 Mar 2012, Jeffrey Walton wrote:


On Thu, Mar 1, 2012 at 10:27 PM, Steven Bellovin s...@cs.columbia.edu wrote:

http://www.scmagazine.com.au/News/292189,nsa-builds-android-phone-for-top-secret-calls.aspx
makes for interesting reading.  I was particularly intrigued by this:

       Voice calls are encrypted twice in accordance with NSA policy,
       using IPSEC and SRTP, meaning a failure requires “two independent
       bad things to happen,” Salter said.

Margaret Salter is the head of the Information Assurance Directorate
of the NSA.

Interesting. I seem to recall that cascading ciphers is frowned upon
on sci.crypt. I wonder if this is mis-information



Yes, I've had that beaten into my head from books/talks/posts forever now, 
but I never quite understood it.


If the end result of your ciphertext has headers or metadata that can be 
used for known-plaintext attack, then it makes sense, but if you are just 
feeding raw ciphertext into the next algorithm, it shouldn't be a 
danger... right ?___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] trustwave admits issuing corporate mitm certs

2012-02-25 Thread John Case


On Sun, 12 Feb 2012, Jeffrey Walton wrote:



(2) Did the other end of the SSL/TLS tunnel also agree to be monitored?




Ding!

Yes, that is the key - and was the key the first time we visited this 
subject a few months ago.


When all is said and done, and Jane Doe cube peasant signs away her life, 
and the browsers all look the other way and every CA is doing it ... 
after all of that, does Wells Fargo actually consent to your bullshit 
Fortune 30,000 firm monitoring their online banking ?


I'll bet not.  How about eftps.gov ?  How about dmv.ca.gov ?

There are two sides to an SSL transaction ...
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography