Re: Quic: the elephant in the room

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, Apr 11, 2021 at 11:39:04PM +0100, Ben Laurie wrote:

> > > CT makes that untrue. Why is this not obvious?
> >
> > Because:
> >
> >     * CT is after the fact, plausibly too late.
> 
> And the on time DNS version is...?

Well the point (already made upthread, ...) is that if domain control is
compromised, so is certificate issuance, Let's Encrypt will happily
issue a certificate for a domain that's been taken over.  With CT
presently ineffective for most domains, the upshot (as stated upthread)
is that WebPKI is at least as vulnerable to compromise as DNS.

Now with DNSSEC and a registrar chosen for good security practices, one
can do better than DV.  True, there's no CT for DNSSEC, but in fact it
is considerably more difficult to surreptitiously compromise DNSSEC
without the domain owner noticing than it is to obtain a certificate
from the least meticulous CA.

There are of course pros/cons for CT and pros/cons for DNSSEC, but my
take is that architecturally DNSSEC is better suited for securing the
typical domain on the public Internet.  Adoption has been hampered
difficult KSK enrollment rollover, immaturity of tooling and by habitual
cynicism from plausibly authoritative voices.

Now in fact the tooling has improved dramatically in the last year or
two (see e.g. BIND 9.16 key management policies), and
registries/registrars are starting to implement CDS/CDNSKEY, see e.g.
recent talks by Brian Dickson of Godaddy about their plans.

Adoption has risen significantly over the last couple of years as well,
though sure, not yet at the pace I'd ultimately like to see.

Which leaves just the naysaying, which sounds mostly like a broken
record, that is disconnected from the changing realities on the
ground.  My take on the naysaying is: lead, follow or get out of
the way!.

> >       - They need to track the CT logs
> >       - They need to keep track of all legitimately issued certificates.
> 
> You have a suggestion that does not need this?

I recognise the reality of this, and therefore don't give as much weight
to the efficacy CT as you do.  The main thing that helps is short(er)
term certificates.  Perhaps LE could move from 90 days to 30 days or
even 7 days, but that would sure stress the CT logs even further.

> CT has been very effective in practice, despite these caveats. I do agree
> there are problems it doesn't inherently solve.

I agree it can be effective for well-resourced highly automated
operations, like e.g. google.com.  I am sceptical that it is
adding any value for the "average" domain.

-- 
    Viktor.




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux