tech-userlevel archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Shipping SSL certificates in the base system
On 07/06/17 02:04, Alistair Crooks wrote:
> Distributing mozilla root certs is hardly "TNF takes on the role of a
> trusted CA source".
Granted, I'm a biased because of $dayjob, but in my view someone
handing me a bunch of CA certificates as part of an installation is by
definition taking on the role of a trusted CA source. I assume you
disagree -- the question is: If there's an incident due to outdated and
compromised root CA's, which view will the security community take --
yours or mine? (To be perfectly honest, I'm way too biased to be able
to answer it objectively, but I ask readers consider this perspective).
(Also, don't misread "trusted CA source" as "CA issuer" -- completely
different entities).
> And we need to start thinking laterally here. Certs are necessarily
> transitory, and we wish any form of added trust to be enduring over a
> period of time.
>
> + Can we use ssh fingerprints of project machines as part of the
> trust-booting procedure, or as a light form of 2FA?
> + Can we ship just a subset of root certs to get, in a trusted way, to
> NetBSD.org, and then download (with a bit more assurance than just a
> straight HTTP GET request) an updated set of mozilla root certs?
> + Can we ship a full set of root certs, as a bootstrap mechanism to
> getting a more up to date set? What is the fallback in this case - no
> service?
> + Can we talk have the certs mirrored, and use a number of similar
> replies from untrusted sources as a bootstrap mechanism?
> + Do we put all of our eggs in one basket, pin the cert, and then rely
> on that being the one true way?
> + How should true revocation be done?
> + root certs which are signed with NetBSD ssh host keys could be an
> interesting area of opportunity
> + Everything else I've forgotten
Everything you list here is essentially a sign of you wanting TNF to
be a trusted CA source, so you've made me very confused with regards to
what your objection was(?).
If you [as in TNF] are willing to set that up (a means to distribute
a CA bundle securely, vouch for it, and provide a mechanism for users to
keep it up-to-date and verify its correctness), I'd be very pleased
(This is something I've wanted for a long time). I'm just against the
idea of "let's ship a bundle of outdated certs, with no means of keeping
them up-to-date, just to shut programs up.", which was my interpretation
of the original suggestion. (Your reply made it clear that I hadn't
made that point sufficiently clear in my previous posts).
I like the direction you're taking this; please don't take my posts
as discouragement.
--
Kind regards,
Jan Danielsson
Home |
Main Index |
Thread Index |
Old Index