TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

No, don't enable revocation checking

180 pointsby moonbootsabout 11 years ago

22 comments

wpietriabout 11 years ago
For those, like me, wondering who the author might be, it appears to be this guy: &quot;Adam Langley works on both Google’s HTTPS serving infrastructure and Google Chrome’s network stack. From the point of view of a browser, Langley has seen many HTTPS sites getting it dreadfully wrong and, from the point of view of a server, he’s part of what is probably the largest HTTPS serving system in the world - See more at: <a href="http://www.rsaconference.com/speakers/adam-langley#sthash.HMdxPRI7.dpuf&quot;" rel="nofollow">http:&#x2F;&#x2F;www.rsaconference.com&#x2F;speakers&#x2F;adam-langley#sthash.HM...</a>
评论 #7615689 未加载
评论 #7615900 未加载
评论 #7616426 未加载
hereonbusinessabout 11 years ago
So this complete infrastructure is crap. OpenSSL, a software half the internet uses but no one cares about because it&#x27;s crap. CA&#x27;s not revoking keys even though they know they&#x27;re compromised. Revocation being worthless because it&#x27;s too much of a hassle for anyone to bother.<p>Great. Maybe now, when half the internet is already compromised and all our certificates are not worth the bytes they&#x27;re made of ... maybe we should try to come up with something better.<p>edit: Actually, this whole heartbleed affair has been quite eyeopening for me, so I&#x27;m thankful for that. But it certainly didn&#x27;t help with the paranoia I feel the last couple of years while using services on the internet.
评论 #7617378 未加载
评论 #7619231 未加载
gojomoabout 11 years ago
Still seeing lots of explanation about why the current system sucks, and not much about how a more robust system might be created and promptly adopted. Langley (the author) mentions short-lived certificates (either rapid expiration or via a &#x27;must staple&#x27;)... how soon can we enforce that? How short can that make the danger-period where the CA, and Google, and the &quot;connected web&quot; all know that a certificate is invalid, but a user-at-risk does not?<p>Why not other ways to rapid-broadcast invalidity in censorship-proof ways, so that a browser encircled by an enemy can quickly figure out something&#x27;s wrong? (Or, why can&#x27;t security professionals get around interdiction as effectively as copyright pirates do?)
评论 #7616655 未加载
评论 #7615505 未加载
AhtiKabout 11 years ago
My quick write-up on this from few days ago, <a href="http://www.ahtik.com/blog/startssl-revocation-fees-will-not-matter-and-ssl-certs-are-funky_u1g8E/" rel="nofollow">http:&#x2F;&#x2F;www.ahtik.com&#x2F;blog&#x2F;startssl-revocation-fees-will-not-...</a><p>Yes, revoke is broken by design, especially with mobile and Chrome browser. I&#x27;d say it&#x27;s broken everywhere except Firefox with OCSP Hard Fail enabled.<p>Thanks to this flaw StartSSL business model has become somewhat outdated IMHO with the free certs and paid revocations.<p>I&#x27;m dreaming that we can fix the revocations issue with 24hour valid certificates. Suggested at the end of my post.<p>But I must be naive on this as it&#x27;s too simple, just haven&#x27;t found the flaw in this myself. Yes, it needs technical orchestration, but at least it does not add extra layer of single point of failure for every session.<p>EDIT: Just finished the OP post and it does indeed also mention &quot;short-lived certificates&quot; in the end as a potential solution.
评论 #7616316 未加载
e12eabout 11 years ago
I think the author is a little disingenuous with the term &quot;security theatre&quot;. Basically he argues that OCSP doesn&#x27;t work because hard fail might cause DOS -- but fails to conclude that without OCSP SSL&#x2F;TLS <i>is useless</i>. It&#x27;s a long argument for saying that the CA system is broken (you can only trust the white-list chrome provides) -- and the sensible conclusion is that <i>you cannot trust any other certificate chains</i> (without OCSP) is left out.<p>Without certificates, SSL&#x2F;TLS falls apart.<p>Perhaps a better use of CAs would be to always delegate authority to the domain owner -- we&#x27;d only need OCSP for the CAs, and domain owners could issue hour&#x2F;day-valid certs via a cert infrastructure. That would push a lot of complexity down to domain owners, it would probably lead to a lot of errors in implementation -- but those errors would only affect the domains -- not the main CA trust chain as such.<p>I&#x27;m not sure if that would be an improvement or not -- but at least you could know that if a domain was run correctly, a valid certificate could actually be trusted...
评论 #7615513 未加载
pronoiacabout 11 years ago
Could we use bloom filters on the CRLs, before checking with OCSP? Maybe I should go crunch the numbers on the viability of that.
评论 #7615960 未加载
评论 #7616166 未加载
epsabout 11 years ago
Just make sure you still check revocation of code signing certificates. Otherwise you will end up running malware that is signed with a legit key they got off my stolen Windows laptop.
colonsabout 11 years ago
This argument only holds if the attacker controls every internet connection you use. If you&#x27;re on a portable device or you&#x27;re otherwise connecting through various networks, only a subset of which are compromised, revocations are still useful.
评论 #7616248 未加载
chacham15about 11 years ago
When I hear these arguments, I always look for what is wrong with OCSP Must Staple. The author says that at the bottom it might be a solution with short lived certs, but I dont see the need for super short lived certs, only short lived OCSP staples. The author presents this as the problem:<p>&gt; if the attacker still has control of the site, they can hop from CA to CA getting certificates. (And they will have the full OCSP validity period to use after each revocation.)<p>The solution here is to not allow OCSP stapling to request a new certificate and use a full OCSP check to verify that the cert wasnt revoked.
wyagerabout 11 years ago
I&#x27;m honestly kind of surprised how little action there has been to assist with a migration away from the CA model. The technology is there, but people just don&#x27;t seem interested enough to leverage it.<p>Systems like Namecoin could serve this purpose marvelously. Powerful devices have direct access to the entire cryptographically authenticated DNS and certificate database. Weak devices can specify whom they trust to provide them with DNS&#x2F;certificate data, and even those devices get some cryptographic security guarantees thanks to technologies like SPV.
评论 #7615541 未加载
评论 #7615539 未加载
评论 #7615614 未加载
评论 #7616274 未加载
mobiplayerabout 11 years ago
I&#x27;ve wondered many times why OCSP isn&#x27;t distributed as DNS is. When we talk about websites, surely there&#x27;s no more than one certificate per hostname (or less, i.e. wildcards). I don&#x27;t think we&#x27;re talking here of something impossible to do or not feasible with our current technology and computing power.<p>Also, certificate &quot;whitelisting&quot; could be a part of the DNS protocol itself (return the IP address of the requested hostname and the hash of its current, valid certificate).
评论 #7616422 未加载
phunehehe0about 11 years ago
It seems the only problem with hard-fail is the risk of DoS attacks by targeting OCSP servers. However, if you include OCSP stapling you won&#x27;t be affected. So a solution may be to encourage all users to enable revocation checking with hard-fail, and all servers to support OCSP stapling.
Khaineabout 11 years ago
It sounds like the internet is broken Without CRL&#x2F;OSCP we cannot truly trust that we are securely communicating.<p>Something has to give. We need to abolish SSL&#x2F;TLS and migrate to something that isn&#x27;t broken by design
评论 #7615902 未加载
yuhongabout 11 years ago
I am thinking that a HSTS option enabling hard-fail OCSP plus OCSP stapling is probably a good idea, though probably less secure than putting it in the certificate.
Splendorabout 11 years ago
Let me get this straight. Sites across the internet are (hopefully) revoking their CAs and issuing new ones to address Heartbleed but Mr. Langley is suggesting that we shouldn&#x27;t check for revoked CAs because it might not do anything and it&#x27;s slow?<p>Sorry, but after the last few weeks I&#x27;ll happily accept a little slowness for the security revocation checking provides in the cases where it does work, even if it&#x27;s not 100% of the cases.
评论 #7617643 未加载
评论 #7617710 未加载
anaphorabout 11 years ago
Can&#x27;t the replay attack mentioned in the article be mitigated by using nonces? Why doesn&#x27;t anyone do this? I&#x27;m genuinely confused by this.
fragmedeabout 11 years ago
The article gives two reasons for why &#x27;soft-fail&#x27; is required: Captive-portals, and OCSP server failure.<p>To deal with captive portals: have an SSL signed &#x27;subdomain.google.com&#x2F;you_are_on_the_internet&#x27; site&#x2F;page that Google Chrome can use to check to see if it&#x27;s captive or not. If it&#x27;s captive, enable soft-fail. If internet access is available, set to hard-fail.<p>Websites these days are complex, with many (digital) moving parts - the database server(s), the static image server(s), dynamic response server(s), gateway server, probably a memcache server or something similar. If any one of those goes down, the site is unusable. Why then, should the OCSP server going down be considered any differently? Is a black-hat rented bot-net running a DDoS going to care if it&#x27;s the main gateway server or the OCSP server?<p>But let&#x27;s say we do consider disabled OCSP servers to be a client-side issue. Google could query and cache the OCSP server status, either with OCSP stapling or via some side-channel they build into Google Chrome.<p>The combination of both would allow hard-fail to be an option in Google Chrome.
papafabout 11 years ago
Theres one thing that I do not understand - why not download the full revocation list?
评论 #7616450 未加载
评论 #7616543 未加载
dwightgunningabout 11 years ago
Why not hard-fail by default and give the user the option to ignore&#x2F;override it? Similar to the way other certificate warnings are shown to the end-user.
评论 #7615763 未加载
rdlabout 11 years ago
Why are we not using OCSP Must Staple right now?
akerl_about 11 years ago
The author appears to entirely ignore attack vectors where the malicious party can record but not modify&#x2F;block traffic.<p>Edit: I get it, I missed that for sites where the key has been changed the stolen key no longer allows such eavesdropping. Thank you to yuhong for helping point this out rather than just laughing at my ignorance while pushing me down the page.
评论 #7615474 未加载
dvanduzerabout 11 years ago
I&#x27;m having a lot of trouble getting past: &quot;Certificates bind a public key and an identity (commonly a DNS name) together.&quot;<p>X.509 certificates bind a public key and a human recognizable string (a &quot;common name&quot;) together to <i>create</i> a verifiable digital identity. Over-simplified, X.509 is about solving the &quot;I&#x27;m Spartacus&quot; problem.<p>CRLs solve the &quot;He was Spartacus&quot; problem. I agree with the broad conclusion that CRLs aren&#x27;t effective for <i>human</i> trust, but they are perfectly reasonable for <i>machine</i> trust.<p>Why didn&#x27;t the author mention Kerberos? The default lifetime of a Kerberos ticket is designed around humans: roughly the length of a work shift in front of a computer terminal.<p>final edit: meta-moderation is hard
评论 #7617773 未加载