[144402] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Microsoft deems all DigiNotar certificates untrustworthy,

daemon@ATHENA.MIT.EDU (Damian Menscher)
Sun Sep 11 02:39:17 2011

In-Reply-To: <CAAAwwbUqiRnJws_hi=5at4uN-cn+qq7PqsYSeWO_OizQkrVyrA@mail.gmail.com>
From: Damian Menscher <damian@google.com>
Date: Sat, 10 Sep 2011 23:30:54 -0700
To: Jimmy Hess <mysidia@gmail.com>
Cc: NANOG mailing list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Fri, Sep 9, 2011 at 11:33 PM, Jimmy Hess <mysidia@gmail.com> wrote:

> On Fri, Sep 9, 2011 at 4:48 PM, Marcus Reid <marcus@blazingdot.com> wrote:
> > On Wed, Sep 07, 2011 at 09:17:10AM -0700, Network IP Dog wrote:
> > I like this response; instant CA death penalty seems to put the
> > incentives about where they need to be.
>
> I wouldn't necessarily count them dead just yet;  although their legit
> customers must be very unhappy  waking up one day to find their
> legitimate working SSL certs suddenly unusable....
>
> So DigiNotar lost their "browser trusted"  root CA status.  That
> doesn't necessarily mean they will
> be unable to get other root CAs to cross-sign CA certificates they
> will make in the future, for the right price.
>
> A cross-sign with CA:TRUE  is  just as good as being installed in
> users' browser.
>

The problem here wasn't just that DigiNotar was compromised, but that they
didn't have an audit trail and attempted a coverup which resulted in real
harm to users.  It will be difficult to re-gain the trust they lost.

Because of that lost trust, any cross-signed cert would likely be revoked by
the browsers.  It would also make the browser vendors question whether the
signing CA is worthy of their trust.

Damian
-- 
Damian Menscher :: Security Reliability Engineer :: Google

home help back first fref pref prev next nref lref last post