Re: Digicert issued certificate with let's encrypts public key

2020-05-18 Thread Kyle Hamilton via dev-security-policy
On Mon, May 18, 2020, 19:46 Ryan Sleevi wrote: > On Mon, May 18, 2020 at 7:55 PM Kyle Hamilton via dev-security-policy > wrote: > > > Regardless of that potential con, though, there is one very important > thing > > which Proof of Possession is good for, regardless

Re: Digicert issued certificate with let's encrypts public key

2020-05-18 Thread Kyle Hamilton via dev-security-policy
That is my reading of the situation, that they're not doing an actual certification of an enrollment without verifying the actual key-identity binding. In addition, I'm wondering if the concept of "third-party attestation" (of identity) is even a thing anymore, given that most CAs issue certificat

Re: Digicert issued certificate with let's encrypts public key

2020-05-18 Thread Kyle Hamilton via dev-security-policy
CABForum's current Basic Requirements, section 3.2.1, is titled "Method to prove possession of private key". It is currently blank. A potential attack without Proof of Possession which PKIX glosses over could involve someone believing that a signature on a document combined with the non-possessio

Re: Francisco Partners acquires Comodo certificate authority business

2017-10-31 Thread Kyle Hamilton via dev-security-policy
it a case of "rumor mill reported as fact"? -Kyle H On 2017-10-31 06:21, Kyle Hamilton wrote: http://www.eweek.com/security/francisco-partners-acquires-comodo-s-certificate-authority-business ___ dev-security-policy mailing list dev-

Francisco Partners acquires Comodo certificate authority business

2017-10-31 Thread Kyle Hamilton via dev-security-policy
http://www.eweek.com/security/francisco-partners-acquires-comodo-s-certificate-authority-business ___ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

Deficiencies in the Web PKI and Mozilla's shepherding thereof, exposed by the WoSign affair

2016-10-03 Thread Kyle Hamilton
The WoSign affair shows that there exist serious deficiencies and vulnerabilities in the Web PKI (and PKI in general). 1. Certificates are clearly not acceptable revocation vectors. WoSign is known to be cross-signed by several independent CAs (as well as 1 CA which is no longer deemed to be inde

Re: Compromised certificate that the owner didn't wish to revoke (signed by GeoTrust)

2016-09-14 Thread Kyle Hamilton
On 9/12/2016 20:20, Jakob Bohm wrote: > On 13/09/2016 03:03, Kyle Hamilton wrote: >> I would prefer not to see a securelogin-.arubanetworks.com >> name, because such makes it look like Aruba Networks is operating the >> captive portal. If (for whatever

Re: Compromised certificate that the owner didn't wish to revoke (signed by GeoTrust)

2016-09-12 Thread Kyle Hamilton
s, >> Steven Medin >> PKI Policy Manager, Symantec Corporation >> >> -Original Message- >> From: Jeremy Rowley [mailto:[email protected]] >> Sent: Tuesday, September 06, 2016 7:06 PM >> To: Steve Medin >> Cc: Gervase Markham ; Kyle Hamilt

Re: Incidents involving the CA WoSign

2016-09-09 Thread Kyle Hamilton
I do have to ask this, though: WoSign has at least one EV issuer. I do not know if there is an issuer with EV permissions in NSS, but WoSign does have an EV code signing issuer in the Microsoft root program. Has this issuer been checked to ensure that it could not have misissued certificates? (

Re: Reuse of serial numbers by StartCom

2016-09-06 Thread Kyle Hamilton
On 9/4/2016 02:04, Eddy Nigg wrote: > On 09/02/2016 07:02 PM, Nick Lamb wrote: >> On Friday, 2 September 2016 08:50:02 UTC+1, Eddy Nigg wrote: >>> Lets speak about relying parties - how does this bug affect you? >> As a relying party I am entitled to assume that there is no more than >> one cert

Re: Reuse of serial numbers

2016-09-06 Thread Kyle Hamilton
On 9/6/2016 04:59, Ben Laurie wrote: > On 1 September 2016 at 11:29, Peter Gutmann wrote: >> Rob Stradling writes: >> I guess it makes them easy to revoke, if a single revocation can kill 313 certs at once. >>> That's true. >> Hey, WoSign has solved the CRL scalability problem! >> >>>

Compromised certificate that the owner didn't wish to revoke (signed by GeoTrust)

2016-09-06 Thread Kyle Hamilton
As far as I know, GeoTrust is not at fault here. They just signed this (domain validated) certificate, and I don't know if they've been notified of it before. That said, I don't have GeoTrust's contact info, and I'm presuming that someone here does. Information here comes from http://blog.sec-co

Re: Proposal: Advocate to get Section 9.3.1 (Reserved Certificate Policy Identifiers) made mandatory.

2014-07-26 Thread Kyle Hamilton
Robin (and everyone), I'm not so sure it's over the top. The fact is, CAs essentially try to do this by issuing through particular certification paths, but expect everyone to have already taken the time to reach out and individually engage with their CAs and read their policies and figure out how

Re: NSA stuff in the news, impact on this program

2013-10-09 Thread Kyle Hamilton
I have come to the conclusion that I cannot rely on commercial certification authorities with whom I do not have an outstanding contract. This means that the security layer of Mozilla is useless to me. To make it useful to me, there are several things that Mozilla must administratively do. Since