Re: [therightkey] RA vs CA

2014-01-08 Thread Ralph Holz
automated trigger from the RA that causes certification; rather it seems to be a delegation of certain duties. The whole thing is specified here: https://www.pki.dfn.de/fileadmin/PKI/Konzept_DFN-PKI.pdf Ralph -- Ralph Holz I8 - Network Architectures and Services Technische Universität Mün

Re: [therightkey] algorithm blacklisting

2014-01-03 Thread Ralph Holz
> Yes. SHA1 is next. There used to be some hesitation to switch to SHA1 Apply s/1/2/ on the last word, please. Ralph -- Ralph Holz I8 - Network Architectures and Services Technische Universität München http://www.net.in.tum.de/de/mitarbeiter/holz/ Phone +49.89.289.18043 PGP: A805 D19C E

Re: [therightkey] algorithm blacklisting

2014-01-03 Thread Ralph Holz
ended with a few more algorithms to check logged certs for other things -- compliance with BR or EV comes to mind. As for auditors, I am wondering if anyone is working on a FF or Chrome add-on that tests consistency of a log. I appreciate it's not a prime priority. Ralph -- Ralph Holz I8 - Ne

Re: [therightkey] algorithm blacklisting

2014-01-03 Thread Ralph Holz
ect host). I think active scans are still worthwhile to collect such information. Ralph -- Ralph Holz I8 - Network Architectures and Services Technische Universität München http://www.net.in.tum.de/de/mitarbeiter/holz/ Phone +49.89.289.18043 PGP: A805 D19C E23E

Re: [therightkey] DNSNMC deprecates Certificate Authorities and fixes HTTPS security

2014-01-03 Thread Ralph Holz
rs, etc. Thus the grace period until 2011. In the meantime, all you can do is blacklist known-rogue certs. Alternatively, pull the root cert from which MD5 signatures were issued. As the MD5 attack still had considerable cost (for the hobby blackhat, not a 3-letter agency), it was deemed that this mu

Re: [therightkey] DNSNMC deprecates Certificate Authorities and fixes HTTPS security

2014-01-03 Thread Ralph Holz
ash algorithm means root cert-like compromise as it means the capacity to imitate a correct signature by a root cert. There is no fix for this but blacklisting. Not in any model with TTPs, by the way. Ralph -- Ralph Holz I8 - Network Architectures and Services Technische Universität München http://w

Re: [therightkey] DNSNMC deprecates Certificate Authorities and fixes HTTPS security

2014-01-03 Thread Ralph Holz
browsers. Furthermore, Mozilla does not accept any non-root certs with MD5 signatures since mid-2011. Ralph -- Ralph Holz I8 - Network Architectures and Services Technische Universität München http://www.net.in.tum.de/de/mitarbeiter/holz/ Phone +49.89.289.18043 PGP: A805 D19C E23E 6BBB E0C4 86

Re: [therightkey] DNSNMC deprecates Certificate Authorities and fixes HTTPS security

2013-12-27 Thread Ralph Holz
not the RAs themselves. In the case of DFN, the intermediate certs only identify the RAs. The RAs do not carry signing power. It is the same at TUM, where I work, BTW. Ralph -- Ralph Holz I8 - Network Architectures and Services Technische Universität München http://www.net.in.tum.de/de/mitarbe

Re: [therightkey] DNSNMC deprecates Certificate Authorities and fixes HTTPS security

2013-12-17 Thread Ralph Holz
CA, sub-* or not. The important point is where the private key is kept. In the case of the DFN, the 'many subCAs' are actually RAs without signing capacity. I'd be much more worried about some resellers of the very popular CAs. Anyone remember Comodo's InstantSSL reseller? Ralph

Re: [therightkey] Draft charter for a Transparency Working Group

2013-12-14 Thread Ralph Holz
bout is whether the work can be taken further at some point to include that mechanism from Sovereign Keys that allows to give, say, an alternate Tor routing (or hidden service), for a given domain, in order to avoid censorship. I'd agree that's not a primary topic for CT, but a worthwhile goal

Re: [therightkey] Certificate Transparency Version 2

2012-08-02 Thread Ralph Holz
changes notbefore/notafter but re-issues cert in same way. With AKID the same, the end-host cert would not need to be re-issued, but you still want the proof of exactly that one certification with that one intermediate cert. Ralph-- Ralph Holz Network Architectures and Services Technische Univer

Re: [therightkey] Certificate Transparency Version 2

2012-08-01 Thread Ralph Holz
diate CA that has a different DN (and maybe key identifier), you'd get a different DER/PEM and a different hash already. Or maybe I'm confused. :) Ralph -- Ralph Holz Network Architectures and Services Technische Universität München http://www.net.in.tum.de/de/mitarbeiter/holz/ PG

Re: [therightkey] Will the real RPF please stand up?

2012-01-27 Thread Ralph Holz
and CT are providing. I thought you were referring to technical issues, like numbers of trusted TTPs = CAs. I don't think your argument applies there. Ralph -- Dipl.-Inform. Ralph Holz I8: Network Architectures and Services Technische Universität München http://www.net.in.

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Ralph Holz
at less TTPs in X.509 is a good idea. Of course, if you're arguing you actually want to move away from X.509 and towards, say, SK, the story may be different. Ralph -- Dipl.-Inform. Ralph Holz I8: Network Architectures and Services Technische Universität München http://www.net.in.tum.de/d

Re: [therightkey] Will the real RPF please stand up?

2012-01-26 Thread Ralph Holz
t;, and work flows are chains. Ralph PS: My problem with the word "architecture" is that today it's mostly used in publications when the authors just mean "something we thought up for our little problem". It's used so often it's almost meaningless. -- Dipl.-Infor

Re: [therightkey] Roundup of Proposals

2012-01-16 Thread Ralph Holz
Hi, The list sounds about right. CA transparency and Sovereign Keys have a lot in common. One thing that I was wondering is why Sovereign Keys does not use Merkle hash chains; my guess so far was performance. And there's some partially-connected things in the works: - Key Pinning in HTTP

Re: [therightkey] EFF's Sovereign Keys

2012-01-16 Thread Ralph Holz
and some of the issues are likely not properly addressed yet. So let's start it. Also, I'd like to see how a real implementation fares - and I'd be willing to set up a first timeline server here at TUM. Ralph -- Dipl.-Inform. Ralph Holz I8: Network Architectures and Services Techni