[liberationtech] verifying SSL certs (was Re: In defense of client-side encryption)
Tom O
winterfilth at gmail.com
Mon Aug 19 19:56:35 PDT 2013
re this has anyone had a look at Tack.io?
On Tue, Aug 20, 2013 at 12:42 PM, Darlene Scott
<darlenescott673 at yahoo.com>wrote:
>
> Has anyone here looked into "Namecoin" at all? I must admit I've only seen
> a two line reference about it and meant to follow up but haven't had the
> time.
>
> https://en.wikipedia.org/Namecoin
>
> Do you think the same distributed approach could be applied to certifying
> SSL-like connections?
>
> Sorry if this question seem naive. I have no deep knowledge of internet
> protocol structure or function.
>
>
> --------------------------------------------
> On Mon, 8/19/13, Ben Laurie <ben at links.org> wrote:
>
> Subject: Re: [liberationtech] verifying SSL certs (was Re: In defense of
> client-side encryption)
> To: "liberationtech" <liberationtech at lists.stanford.edu>
> Date: Monday, August 19, 2013, 3:41 AM
>
>
>
>
> On 14 August 2013
> 10:46, Guido Witmond <guido at witmond.nl>
> wrote:
>
> On
> 08/14/13 15:18, Ben Laurie wrote:
>
> > On 14 August 2013 08:54, Guido Witmond <guido at witmond.nl
>
> > <mailto:guido at witmond.nl>>
> wrote:
>
> >
>
> > On 08/13/13 19:42, Andy Isaacson wrote:
>
> > > On Mon, Aug 12, 2013 at 11:10:39AM +0200,
> Guido Witmond wrote:
>
> > >> There is another problem. You rely on
> HTTPS. Here is the 64000
>
> > >> dollar question:
>
> > >>
>
> > >> Q._"What is the CA-certificate for
> your banks' website?"_
>
> > >>>
>
>
>
> [snip]
>
>
>
> > I too have given up on expecting security from
> the global CA's. That's
>
> > why I want to see DNSSEC succeed.
>
> >
>
> >
>
> > DNSSEC merely transfers the problem to registries and
> registrars, who
>
> > are no more reliable than CAs. You need to solve the
> problem of having
>
> > to trust third parties before DNSSEC will work (which
> is the same
>
> > problem you need to solve for CAs),
>
>
>
> Yes, there is trust involved, but there is a difference.
>
>
>
> With CA's anyone can sign a certificate for any site.
> It's a race to the
>
> bottom with no winners. Not even the CA's as they
> can't differentiate
>
> between themselves. The consequence is that no one trusts
> any of them.
>
> And who likes to do business with a party he doesn't
> trust but needs anyway?
>
>
>
> With DNSSEC, I have the choice of registrar. If there is a
> bad apple, I
>
> choose another who I find better worth my money.
>
>
>
>
>
> > And, sorry to bang on about it, but
>
> > the answer is Certificate Transparency. BTW, my team is
> about to start
>
> > looking at DNSSEC Transparency, too.
>
>
>
> Don't bang to hard: DNSSEC and CT solve the same
> problem.
>
> This is not
> correct.
>
>
>
> The problem is that there is no registry that specifies
> which of the
>
> Global Certificate authorities is the one you should trust
> to validate a
>
> server-certificate. The mess we have right now is that each
> of the
>
> Global CA's can sign a server certificate. Hence my
> 64000 dollar question.
>
>
>
> Both DNSSEC and CT solve the problem. Albeit in different
> ways with
>
> different pros and cons.
>
>
>
> With DNSSEC and DANE, the site operator specifies *a priori*
> which CA he
>
> uses to sign the server certificates. It can be a self
> signed certificate.
>
>
>
> With CT, you register which CA has signed a certificate for
> a web site
>
> *after the fact*.
>
> Not really. The registration occurs before the
> cert can be used.
>
>
>
> We need them both! To keep the CA's and registrars
> honest. I really
>
> appreciate your work on CT.
>
> CT does not keep registrars honest. This is why
> you need DNSSEC transparency.
>
>
>
> Guido.
>
>
>
>
>
> --
>
> Liberationtech is a public list whose archives are
> searchable on Google. Violations of list guidelines will get
> you moderated:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech.
> Unsubscribe, change to digest, or change password by
> emailing moderator at companys at stanford.edu.
>
>
>
>
>
> -----Inline Attachment Follows-----
>
> --
> Liberationtech is a public list whose archives are
> searchable on Google. Violations of list guidelines will get
> you moderated:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech.
> Unsubscribe, change to digest, or change password by
> emailing moderator at companys at stanford.edu.
> --
> Liberationtech is a public list whose archives are searchable on Google.
> Violations of list guidelines will get you moderated:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech.
> Unsubscribe, change to digest, or change password by emailing moderator at
> companys at stanford.edu.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20130820/90c0a455/attachment.html>
More information about the liberationtech
mailing list