[ale] https
Keith R. Watson
keith.watson at gtri.gatech.edu
Thu Feb 14 12:17:39 EST 2002
The issue is not that one is more "secure" than the other. It's really all
about convenience.
There are two things that people need to know when using certificates.
1. You are who you say you are
2. The data being transmitted is secure.
Using opens source certificates you can encrypt the data (2) just as well
as the commercial products. What they do not do is conveniently insure you
are who you say you are (1).
The basis of security is mutual trust. We have to have some way of knowing
that we are both who we say we are, or in the case of e-commerce that the
vendor getting my VISA number is who they say the are.
Here's an example:
Fred knows Wilma
Barney knows Fred
so when Fred introduces Wilma to Barney, Barney has some assurance (based
on how much he trusts Fred) that Wilma is Wilma.
So what?
What if Fake-Wilma walks up to Barney and says, "hey I'm the same Wilma
that Fred knows". How does Barney know she is telling the truth? Simple, go
ask Fred, who will immediately point out that she is a fake.
Lets look at it from a net perspective, I go to what I think is
Fred-the-Web-Guy's site and am presented with a self singed certificate
saying he is Fred-the-Web-Guy. How do I know it was really signed by Fred?
I don't unless I'm already in possession of a properly authenticated key
that I got from a trusted source that proves Fred's key was used to sign
the certificate.
That's where VeriSign and their competitors come in. Their authenticated
key came with the browser I'm using (which I supposedly got from a trusted
source) and they verified that Fred-the-Web-Guy is who he says he is and
sign his certificate. Hence, VeriSign (who I supposedly trust) essentially
introduced me to Fred-the-Web-Guy.
Without a third party that is known and trusted in advance by the two
parties that want to be introduced there is no way of knowing you are who
you say you are. Given that, I can hijack your site and claim I'm you.
That is the basic weakness of public key systems, there isn't a convenient
way to insure that I have an authenticated key from a trusted source for
everyone in advance, on the off chance I want to verify some random person
is who they say they are.
With VeriSign and their competitors I would theoretically only have to
trust them, and then I'm ready to safely talk to anyone they introduce me
to. That is unless I can't trust VeriSign and their competitors to verify
your identity in advance, hence the magnitude of the calamity caused by the
bogus Verisign
certificates that got loose. Are there any other bogus ones out there we
don't know about?
In the mean time you can self sign a certificate, just be aware that you
will have to provide in advance, an authenticated key through a trusted
method to everyone you want to use your site. Clearly not impossible, just
not convenient.
I know it sounds like I'm saying VeriSign and their competitors are the
best answer. I'm not. For the moment they seem to be the most convenient,
but only until an open source solution is engineered that solves the
problem. I'm hoping that will happen, but I'm also aware that it's just not
that easy to do. If it were we would already be doing it. (although absence
of something is not generally accepted as a fact of difficulty)
That's why I like the ALE list. We can define the problem and then
thousands of minds run off to fix it. Sort of a human based distributed
computing system.
keith
At 03:02 PM 2/13/2002 -0500, Greg wrote:
>I think that the certificate businesses (Verisign and Thwate) do some
>research into the certificate holder to make sure that it is a "real"
>business and not some 3l33t hax0r.... but I came across someone's
>investigation where they basically had their pet dog as the head of a
>fictional company that got a certificate.... (hmmm could this work so that I
>can I claim my 2 dogs and the SO's 2 cat's as dependents on taxes?.. JUST
>KIDDING ! ). I also think that it is supposed to be set up something like
>the public/private key authentication mechanism and also with browsers and
>their "OK'ing" stuff when the cert is from Verisign/Thwate. However, let us
>not forget that a black hat got 9 certificate #'s that belonged to our dear
>friends from Redmond. Of course when it made the news MS made a patch that
>would fix IE to not trust the 9 numbers (and what else it did I don't know).
>
>It depends on what degree of security you want and how much you are willing
>to do/pay for. My last job just used a self generated certificate, but we
>were not dealing with any e-commerce.
>
>Basically you are correct in your summation concerning the cert pimps and
>"joe the web guy".
>
>Greg the web guy (not to be confused w/ joe the web guy)
>
> > -----Original Message-----
> > From: Geoffrey [mailto:esoteric at 3times25.net]
> > Sent: Wednesday, February 13, 2002 2:18 PM
> > To: ale at ale.org
> > Subject: Re: [ale] https
> >
> >
> > Denny Chambers wrote:
> > > Here is a link to the modssl userguide, which talks about creating your
> > > own self sign certificates. This will work on your ssl server, although
> > > this method is not as secure as having a real certificate from a CA. On
> > > the other hand this is a lot cheaper.
> >
> > Correct me if I'm wrong, but the security of a self signed certificate
> > is no less then the security of a purchased one. The only difference is
> > that folks visiting your site might feel more comfortable finding the
> > certificate is signed by one of the well known certificate rapists,
> > rather then being signed by 'joe the web guy.'
> >
> > --
> > Until later: Geoffrey esoteric at 3times25.net
> >
> > "...the system (Microsoft passport) carries significant risks to
> > users that
> > are not made adequately clear in the technical documentation available."
> > - David P. Kormann and Aviel D. Rubin, AT&T Labs - Research
> > - http://www.avirubin.com/passport.html
> >
> >
> > ---
> > This message has been sent through the ALE general discussion list.
> > See http://www.ale.org/mailing-lists.shtml for more info.
> > Problems should be
> > sent to listmaster at ale dot org.
> >
> >
> >
>
>
>---
>This message has been sent through the ALE general discussion list.
>See http://www.ale.org/mailing-lists.shtml for more info. Problems should be
>sent to listmaster at ale dot org.
-------------
Keith R. Watson GTRI/AIST
Systems Support Specialist III Georgia Tech Research Institute
keith.watson at gtri.gatech.edu Atlanta, GA 30332-0816
404-894-0836
---
This message has been sent through the ALE general discussion list.
See http://www.ale.org/mailing-lists.shtml for more info. Problems should be
sent to listmaster at ale dot org.
More information about the Ale
mailing list