[70090] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

THe Internet is Too Secure Already (was Re: Buying and selling root

daemon@ATHENA.MIT.EDU (Sean Donelan)
Wed Apr 28 23:20:17 2004

Date: Wed, 28 Apr 2004 23:19:48 -0400 (EDT)
From: Sean Donelan <sean@donelan.com>
To: "Steven M. Bellovin" <smb@research.att.com>
Cc: nanog@merit.edu
In-Reply-To: <20040429010528.838BA7B46@berkshire.research.att.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Wed, 28 Apr 2004, Steven M. Bellovin wrote:
> Matt Blaze said it well:  "A commercial CA will protect you from anyone
> from whom they won't take money."

With current SSL implementations, you have to rely on all of the
commercial CAs not taking the money.  Any match wins.

> verification that the spoof was detected.  Is this good enough?  What's
> your threat model...?

My threat model was simple :-) I wanted to reduce the messages in my logs
about certificate verification failures.  I could load a few widely used
CA's or I could just turn certificate verification off (the default) and
the messages would stop.

Eric Rescorla gave a good talk at USENIX Security last year called
"The Internet is Too Secure Already"
   http://www.rtfm.com/TooSecure-usenix.pdf

Part of his talk was the threat model mismatch on the Internet.

   - Excessive concern with active attacks
   - Taking cryptanalytic attacks too seriously
   - Forgetting about other threats


home help back first fref pref prev next nref lref last post