[144585] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Microsoft deems all DigiNotar certificates untrustworthy, releases

daemon@ATHENA.MIT.EDU (Lou Katz)
Wed Sep 14 13:04:25 2011

Date: Wed, 14 Sep 2011 10:02:48 -0700
From: Lou Katz <lou@metron.com>
To: nanog@nanog.org
Mail-Followup-To: nanog@nanog.org
In-Reply-To: <20110913152427.GE19208@hiwaay.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

The problem that I see with browser response to self-signed (or org generated) certs is
not the warning(s) but the assertion that the cert is invalid. Not issued by one of the
players in the Protection Racket does not make the cert invalid. It may be untrustable,
unreliable, from an unknown and/or unverifiable source, but it IS a valid cert. Certs in
a revocation list or malformed certs are invalid. 

After all, the Diginotar certs were 'valid', until revoked. Apparently the (arbitrary)
inclusion or exclusion of a root cert by each browser creator or distributer is
equated with validity. By removing the Diginotar root cert, suddenly ALL Diginotar
certs are now reported to end users as Invalid? By refusing to include a CACert root
certificate, no CACert certificate is 'valid'? I think not.

-- 

-=[L]=-
Hand typed on my Remington portable



home help back first fref pref prev next nref lref last post