public inbox for gentoo-user@lists.gentoo.org
 help / color / mirror / Atom feed
From: lee <lee@yagibdah.de>
To: gentoo-user@lists.gentoo.org
Subject: Re: [gentoo-user] broken seamonkey :(
Date: Sun, 13 Sep 2015 16:23:08 +0200	[thread overview]
Message-ID: <87613eflf7.fsf@heimdali.yagibdah.de> (raw)
In-Reply-To: <BLU436-SMTP12466E90B53ABC4EDDC65948D550@phx.gbl> (Fernando Rodriguez's message of "Sun, 6 Sep 2015 15:17:31 -0400")

Fernando Rodriguez <frodriguez.developer@outlook.com> writes:

> On Sunday, September 06, 2015 4:29:25 PM lee wrote:

> [...]
>> 
>> When creating the certificate, I have used the fqdn the host does
>> actually have and knows itself by (because I needed to fill in the
>> fields, and it seemed most reasonable to use the actual host name).
>> 
>> That this host can be reached at all, via different fqdns and IPs, is a
>> matter of network traffic (re-)direction and of how the DNS-entries
>> currently happen to be.  They are all transparent and irrelevant to the
>> user/client and subject to change.  Why should they matter for a
>> certificate which is supposed to let me figure out whether I'm
>> connecting to the host I'm expecting to connect to, or to something
>> else?
> [...]
>
> An SSL certificate provides both encryption and authentication. For the 
> encryption part it's simple, you own the private key, the certificate has the 
> public key, so only you can decrypt whatever is encrypted with it. 
>
> Authentication is more complicated. It's easy if you think of if like a driver 
> license. The hostname is like the photo, if I get pulled over and hand over a 
> stolen license to the officer he'll know it's not me by looking at the photo. 
> Your browser does the same with the hostname, if somebody steals your private 
> key they will also have to steal your domain name to impersonate you. If 
> somebody grabs a hold of your CA's private key is like stealing the DMV 
> printer, now they can issue themselves a license with your name and their own 
> picture. But if they hand it over to an officer he will call it in and find out 
> it's fake, that's the equivalent of revocation lists and ocsp.
>
> Of course it only works because we trust the DMV (or the CA in this case) to 
> be diligent in verifying you are who you say you are before issuing a license 
> or certificate. So it all doesn't apply as much to self issued certificates but 
> it still applies to some extent.

Actually, it does not work.  What my face looks like is not subject to
network traffic (re-)direction and the content of DNS entries.  It
changes with age and can still be recognized.  I could send you a
picture of my face and you would never know whose face is on the
picture: that's like an FQDN or IP.  I could just as well give you an IP
address or FQDN to identify myself.

The purpose of driver licenses is not identification.  Anyway, why would
I need some sort of document to identify myself if my face would
suffice?  In practise, the document is more important than the face
that's on it.

IIRC, there is a way with gpg to change the email address(es) of your
key.  That makes sense because the address is for having the convenience
of not needing to specify a key-ID or something else.  And that I might
be using another email address does not invalidate the key.  It's the
key itself which is relevant, not what is being used to pick which key
to choose.

Linking a certificate to an FQDN or IP is clutching at straws at best.
As my face changes with time, they also do.  With documents to identify
me, I don't update the picture all the time.

When the ID-document I currently have expires, I won't have one that
hasn't expired because they have become so insanely expensive that I
can't afford one.  That's similar to the work it would take to put a new
certificate in place for all the users just because it's linked to an
FQDN/IP.  It might be cheaper if you could change out the picture as you
can change the email address with gpg.

The concept is flawed.  And how could I myself verify that a CA does its
job the way they are supposed to do it?  In the end, it's no more than a
deception, and that shouldn't be needed to be able to use encrypted
connections.


-- 
Again we must be afraid of speaking of daemons for fear that daemons
might swallow us.  Finally, this fear has become reasonable.


  reply	other threads:[~2015-09-13 14:24 UTC|newest]

Thread overview: 32+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-09-03 19:53 [gentoo-user] broken seamonkey :( lee
2015-09-03 20:10 ` Fernando Rodriguez
2015-09-03 23:39   ` lee
2015-09-04  0:08     ` Fernando Rodriguez
2015-09-04  1:23     ` Dale
2015-09-04  7:54     ` Peter Weilbacher
2015-09-04 10:43       ` Mick
2015-09-04 19:50         ` lee
2015-09-04 20:25           ` Fernando Rodriguez
2015-09-04 23:05             ` lee
2015-09-05  0:43               ` Fernando Rodriguez
2015-09-05 12:06                 ` lee
2015-09-05  1:08               ` Fernando Rodriguez
2015-09-05 10:14                 ` Mick
2015-09-05 16:22                   ` lee
2015-09-05 17:16                     ` Mick
2015-09-06 14:29                       ` lee
2015-09-06 18:35                         ` Mick
2015-09-12 11:54                           ` lee
2015-09-06 19:17                         ` Fernando Rodriguez
2015-09-13 14:23                           ` lee [this message]
2015-09-05 13:06                 ` lee
2015-09-05 17:09                   ` Mick
2015-09-05 21:40                     ` Fernando Rodriguez
2015-09-05 22:24                       ` Mick
2015-09-06 13:18                         ` lee
2015-09-06 13:03                       ` lee
2015-09-06 18:44                         ` Fernando Rodriguez
2015-09-06  2:45                     ` lee
2015-09-06 18:12                       ` Mick
2015-09-12 11:20                         ` lee
2015-09-12 11:23                   ` [gentoo-user] SOLVED: " lee

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87613eflf7.fsf@heimdali.yagibdah.de \
    --to=lee@yagibdah.de \
    --cc=gentoo-user@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox