nanog mailing list archives

RE: The state-level attack on the SSL CA security model


From: "Akyol, Bora A" <bora () pnl gov>
Date: Fri, 25 Mar 2011 09:30:48 -0700

Thanks

The other point I wanted to make is that not every solution is going to work for
every person. If we can improve the current state of things and make life better
for say another 50% of users, that's better than what we have now.
For example in Firefox 4, I could write an extension (if possible) that intercepts the
certificate acceptance dialog and instead does a web query to see how many of
my friends and also their friends  accepted the same cert and at least allow me
to decide with more information than I am presented now. And you could argue
that this should also apply to certs signed by CAs that are in the trust store of the
web browser too.

Just thinking out loud here.


-----------------------------------------------------------------------------------------------
From: Dorn Hetzel [mailto:dorn () hetzel org] 
Sent: Friday, March 25, 2011 9:24 AM
To: Akyol, Bora A
Cc: Valdis.Kletnieks () vt edu; nanog group
Subject: Re: The state-level attack on the SSL CA security model

Not entirely unreasonable.  A button for "friend" and then one for "trusted friend" :)
On Fri, Mar 25, 2011 at 12:19 PM, Akyol, Bora A <bora () pnl gov> wrote:
One could argue that you could try something like the facebook model (or facebook itself). I can see it coming.
Facebook web of trust app ;-)



-----Original Message-----
From: Valdis.Kletnieks () vt edu [mailto:Valdis.Kletnieks () vt edu]
Sent: Friday, March 25, 2011 9:05 AM
To: Akyol, Bora A
Cc: Dobbins, Roland; nanog group
Subject: Re: The state-level attack on the SSL CA security model
On Fri, 25 Mar 2011 08:36:12 PDT, "Akyol, Bora A" said:
Is it far fetched to supplement the existing system with a reputation
based  model such as PGP? I apologize if this was discussed before.

That would be great, if you could ensure the following:

1) That Joe Sixpack actually knows enough somebodies who are trustable to sign stuff. (If Joe doesn't know them, then 
it's not a web of trust, it's just the same old CA).

2) That Joe Sixpack doesn't blindly sign stuff himself (I've had to on occasion scrape unknown signatures off my PGP 
key on the keyservers, when people I've never heard of before have signed my key "just because somebody they recognized 
signed it").

The PGP model doesn't work for users who are used to clicking everything they see, whether or not they really should...




Current thread: