On Sep 13, 2011, at 9:15 PM, Peter Saint-Andre wrote: > On 9/12/11 5:53 PM, =JeffH wrote: >> >> This is great, thanks for posting this here. >> >> I have various comments on it I'll try to get to in the next day or so. >> >> During HSTS's gestation, various parties have discussed potential >> "LockCA" and "LockEV" directives ostensibly having similar semantics to >> what you've proposed here (see talk slides from last few websec sessions >> at IETF meetings). (though I think recent events pretty much obviate >> those nominal ideas because they'd relied on the resilience of one's CA >> and the CA infrastructure (oops)) > > <hat type='individual'/> > > Jeff, why do you say that? It seems to me that if you think various CAs > are dodgy or vulnerable, but you know and like the policies of the CA > you're using, you might well want to lock into that CA.
As a customer, I have very little insight into the policies of the CA I'm using. For all I know, the actual signing may be done on a server, accessible from the Internet through SSH with the user "root" and the password "password", and then it's just an OpenSSL script conveniently located along with the private key in root's home directory. Alternatively, it's possible that the private key is stored on the web server and accessible as http://www.exampleca.com/../ca.key Locking yourself into a CA like that seems like a bad idea. Unlike the Dutch government and Mozilla, most customers do not have the pull to force CAs to submit to audits. Six months ago we would not have thought that Comodo or DigiNotar were easy to hack. In the latter case, the customers of DigiNotar were left out in the cold. Without certificate pinning, they just need to spend money on a new certificate and their site is working again. With it, they are in trouble. _______________________________________________ websec mailing list websec@ietf.org https://www.ietf.org/mailman/listinfo/websec