Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-08 Thread Chris Palmer
On Fri, Jun 5, 2015 at 8:04 AM, Peter Kurrasch fhw...@gmail.com wrote: Certificate Transparency gets us what we want, I think. CT works globally, and is safer, and significantly changes the trust equation: ‎ * Reduces to marginal/effectively destroys the attack value of mis-issuance Please

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-08 Thread Peter Kurrasch
My point is that you cannot say CT effectively destroys the attack value of mis-issuance and then as justification say that you are assuming someone will notice. This is the gap I'm talking about: the space between when a mis-issuance takes place and when someone notices. For the sake of

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-08 Thread Clint Wilson
To further support your claims here, Chris, there are already tools coming out which actively monitor domains in CT logs and can be set up with notifications of misissuance: https://www.digicert.com/certificate-monitoring/

Re: New certificate search tool - crt.sh

2015-06-08 Thread Hubert Kario
On Wednesday 03 June 2015 09:43:23 Eric Mill wrote: This is outstanding - simple, but totally what people need to start getting the idea and benefit of CT. One high ROI addition might be RSS feeds for search terms. That way, I could create e.g. an IFTTT alert that emails me whenever a

Re: New certificate search tool - crt.sh

2015-06-08 Thread Rob Stradling
On 08/06/15 14:54, Hubert Kario wrote: On Wednesday 03 June 2015 09:43:23 Eric Mill wrote: This is outstanding - simple, but totally what people need to start getting the idea and benefit of CT. One high ROI addition might be RSS feeds for search terms. That way, I could create e.g. an IFTTT