* There's currently no other service like crt.sh. It's essentially a
single point of failure of a lot of "WebPKI security stuff" people do.
Imagining something like a more than 10x increase in cert volumes (which
would be the consequence of 6-day certs as the norm) probably means
many people will just stop utilizing CT to find security issues in the
WebPKI ecosystem. Add to that the fact that, depending on how fast the
Quantum Cryptopocalypse will materialize itself, we may also have to
increase the size per certificate quite substantially.
I think this should be considered when discussing very-short-lived
certs.
--
Hanno Böck - Independent security researcher
https://itsec.hboeck.de/
https://badkeys.info/
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/20241212133018.05ec7cae%40computer.
Google "SSH", that's been running for about the same time as TLS using key
continuity. TLS has a booming global cybercrime industry built around the
failure of certificates to deal with spoofing, SSH has very little in the way
of spoofing (granted they're very different protocols serving different
purposes).
>From a brief web search, I'm not finding very much on the topic of key
>continuity. The most relevant-looking result is
>https://datatracker.ietf.org/doc/draft-gutmann-keycont/, which is an I-D that
>expired in 2009, and does not appear to have been pursued since.
Bit of an odd choice to take an ancient expired RFC draft given the large
amount of research publications around this, commenting as the author of said
draft I had a go at it but given that there's an established billion-dollar
industry built around selling bit strings I figured working on an RFC that
pointed out alternatives was going to be a non-starter.
Peter.
>The research publications areen't coming up on DDG, but your draft was --
>that's why I made the "odd choice" of mentioning it. Would you be able to
>share links to some more relevant reading material?
I don't have references lying around but there's been quite a few publications
on trust models that look at this and related things like PGP's web of trust,
as well as evaluations of whether they work or not [0]. Not trying to be
abstruse here, I just don't have a record of things I would have read 15 years
ago, or perhaps merely glanced at 15 years ago.
Peter.
[0] Conflict-of-interest disclaimer, I'm the author of one of those, "Do Users
Verify SSH Keys?",
https://static.usenix.org/publications/login/2011-08/pdfs/Gutmann.pdf.
>Not trying to be abstruse here, I just don't have a record of things I would
>have read 15 years ago, or perhaps merely glanced at 15 years ago.
Just remembered one of them, "Perspectives: Improving SSH-style Host
Authentication with Multi-Path Probing" from 2008, on SSH-style key continuity
for TLS servers (it also has a multipath notary architecture to allow for
history-based assertions like "Offered key conflicts with cached key, but has
been consistently seen for Z days", but its main feature is the use of key
continuity). Use to be available as a browser extension, not sure if it
still is today.
Peter.
Would you mind sharing which specific features you're looking for to make it a suitable alternative for your needs?
Hi, I hope this is a good place to share these thoughts, but given it's the "all things CA" discussion place, it seems to fit. In a recent post, Let's Encrypt mentions plans for very-short-lived certificates with a lifetime of 6 days:
-- You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group. To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org