<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Should Verisign sue Sotirov / Appelbaum?</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=116" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=116</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=116&#038;cpage=1#comment-124</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Tue, 06 Jan 2009 23:15:58 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=116#comment-124</guid>
		<description><![CDATA[@Jon -

I certainly don&#039;t mean them to be straw men, but I do find your argument fairly generic as well, so maybe I am taking liberties. Here are some clarifications:

- It is up to the damaged party to assert liability and to sue somebody. That means someone who feels damaged should attempt it. To suggest somebody is liable also assumes that the injured party will sue for damages. I think it would be interesting (and fruitless) for someone to try to sue the CA.

- The action above does not preclude RapidSSL from seeking damages from the researchers for reasons originally described. I don&#039;t know if this would work or not. Clearly, the researchers increased the risk by a huge amount (though I don&#039;t believe increased risk is enough to assert damages).

- These two theoretical civil suits are not mutually exclusive nor are they synchronized in any way, so I don&#039;t understand why you think someone should be sued &quot;before&quot; or &quot;prior&quot; to anyone else.

- My point with 3 and 4 relate to the assumption that people always want to assign liability based on individual vulnerabilities (how many times as the Internet died again?) yet there is no objective litmus test to determine this with software (actually, there is, but nobody uses it). Affect and availability heuristics prevail in cases like these, which is probably the reason you don&#039;t want to &quot;touch this&quot;.

- If you are suggesting that every website that can set up an SSL tunnel should be trusted, I think you are crazy. No, the point of the generic CA is definitely not trust. It simply satisfies a process to set up an encrypted channel between two untrusted points. (This is different from true CAs in meaningful PKIs).
]]></description>
		<content:encoded><![CDATA[<p>@Jon -</p>
<p>I certainly don&#8217;t mean them to be straw men, but I do find your argument fairly generic as well, so maybe I am taking liberties. Here are some clarifications:</p>
<p>- It is up to the damaged party to assert liability and to sue somebody. That means someone who feels damaged should attempt it. To suggest somebody is liable also assumes that the injured party will sue for damages. I think it would be interesting (and fruitless) for someone to try to sue the CA.</p>
<p>- The action above does not preclude RapidSSL from seeking damages from the researchers for reasons originally described. I don&#8217;t know if this would work or not. Clearly, the researchers increased the risk by a huge amount (though I don&#8217;t believe increased risk is enough to assert damages).</p>
<p>- These two theoretical civil suits are not mutually exclusive nor are they synchronized in any way, so I don&#8217;t understand why you think someone should be sued &#8220;before&#8221; or &#8220;prior&#8221; to anyone else.</p>
<p>- My point with 3 and 4 relate to the assumption that people always want to assign liability based on individual vulnerabilities (how many times as the Internet died again?) yet there is no objective litmus test to determine this with software (actually, there is, but nobody uses it). Affect and availability heuristics prevail in cases like these, which is probably the reason you don&#8217;t want to &#8220;touch this&#8221;.</p>
<p>- If you are suggesting that every website that can set up an SSL tunnel should be trusted, I think you are crazy. No, the point of the generic CA is definitely not trust. It simply satisfies a process to set up an encrypted channel between two untrusted points. (This is different from true CAs in meaningful PKIs).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=116&#038;cpage=1#comment-123</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Tue, 06 Jan 2009 22:52:59 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=116#comment-123</guid>
		<description><![CDATA[@Security4All -

I agree that it might not be fraud, I just think that this kind of situation is grayer than &#039;standard&#039; vuln discovery/disclosure as discussed in my original post.

Responsible disclosure incorporates notification of the affected vendor with some grace period prior to public discussion. They didn&#039;t do that. The reason they used is a reason that anyone could use in this arena and therefore means that nobody needs to follow responsible disclosure (which they don&#039;t anyway).
]]></description>
		<content:encoded><![CDATA[<p>@Security4All -</p>
<p>I agree that it might not be fraud, I just think that this kind of situation is grayer than &#8216;standard&#8217; vuln discovery/disclosure as discussed in my original post.</p>
<p>Responsible disclosure incorporates notification of the affected vendor with some grace period prior to public discussion. They didn&#8217;t do that. The reason they used is a reason that anyone could use in this arena and therefore means that nobody needs to follow responsible disclosure (which they don&#8217;t anyway).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jon</title>
		<link>http://spiresecurity.com/?p=116&#038;cpage=1#comment-122</link>
		<dc:creator>Jon</dc:creator>
		<pubDate>Tue, 06 Jan 2009 21:29:41 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=116#comment-122</guid>
		<description><![CDATA[Back to you Pete:

My argument related to your argument was that the CA should be liable to the end user and/or Internet community prior towards any litigation going towards the authors.  A better argument against your position (IANAL either) would be my hope that since the CA did not take actions against a 2 year old paper that, their lawsuit would not hold up.  But my cynicism for technical reasoning affecting legal proceedings is very deep.

#1: I don&#039;t recall anything about the CA being sued, so I see this as a non sequitur to my comment.  I see the CA being penalized by the community it supposedly is offering trust.

#2, #3, #4  I&#039;m lost as to how these relate to my comments.  No offense, but they seem like straw man arguments.  For #2, step back and then ask yourself what is the purpose of a CA.  #3, I don&#039;t think I included or excluded any adversary in the discussion.  #4, um, yeah, not even touching this.

Btw, I have disabled the RapidSSL CA [1] in my settings.  The whole point of a CA is trust.

[1] C=US, O=Equifax Secure Inc., CN=Equifax Secure Global eBusiness CA-1
]]></description>
		<content:encoded><![CDATA[<p>Back to you Pete:</p>
<p>My argument related to your argument was that the CA should be liable to the end user and/or Internet community prior towards any litigation going towards the authors.  A better argument against your position (IANAL either) would be my hope that since the CA did not take actions against a 2 year old paper that, their lawsuit would not hold up.  But my cynicism for technical reasoning affecting legal proceedings is very deep.</p>
<p>#1: I don&#8217;t recall anything about the CA being sued, so I see this as a non sequitur to my comment.  I see the CA being penalized by the community it supposedly is offering trust.</p>
<p>#2, #3, #4  I&#8217;m lost as to how these relate to my comments.  No offense, but they seem like straw man arguments.  For #2, step back and then ask yourself what is the purpose of a CA.  #3, I don&#8217;t think I included or excluded any adversary in the discussion.  #4, um, yeah, not even touching this.</p>
<p>Btw, I have disabled the RapidSSL CA [1] in my settings.  The whole point of a CA is trust.</p>
<p>[1] C=US, O=Equifax Secure Inc., CN=Equifax Secure Global eBusiness CA-1</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Security4all</title>
		<link>http://spiresecurity.com/?p=116&#038;cpage=1#comment-121</link>
		<dc:creator>Security4all</dc:creator>
		<pubDate>Tue, 06 Jan 2009 20:22:02 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=116#comment-121</guid>
		<description><![CDATA[The (online) discussion continued, you should read this latest article by Alex:
http://www.phreedom.org/blog/2009/verisign-and-responsible-disclosure/

They never issued certificates to anyone. I still don&#039;t see how they acted in a fraudulent way and disregarded responsible disclosure to the vendor.
]]></description>
		<content:encoded><![CDATA[<p>The (online) discussion continued, you should read this latest article by Alex:<br />
<a href="http://www.phreedom.org/blog/2009/verisign-and-responsible-disclosure/" rel="nofollow">http://www.phreedom.org/blog/2009/verisign-and-responsible-disclosure/</a></p>
<p>They never issued certificates to anyone. I still don&#8217;t see how they acted in a fraudulent way and disregarded responsible disclosure to the vendor.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=116&#038;cpage=1#comment-120</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Tue, 06 Jan 2009 17:00:04 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=116#comment-120</guid>
		<description><![CDATA[@CG -

Does this count? ;-) If there are factual inaccuracies in my post, please point them out. If you disagree with my opinion, I&#039;d enjoy hearing the counterargument. Thanks.
]]></description>
		<content:encoded><![CDATA[<p>@CG -</p>
<p>Does this count? <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' />  If there are factual inaccuracies in my post, please point them out. If you disagree with my opinion, I&#8217;d enjoy hearing the counterargument. Thanks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: CG</title>
		<link>http://spiresecurity.com/?p=116&#038;cpage=1#comment-119</link>
		<dc:creator>CG</dc:creator>
		<pubDate>Tue, 06 Jan 2009 16:36:02 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=116#comment-119</guid>
		<description><![CDATA[I think you should go watch the presentation before, well before you respond to any other comments.
]]></description>
		<content:encoded><![CDATA[<p>I think you should go watch the presentation before, well before you respond to any other comments.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=116&#038;cpage=1#comment-118</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Mon, 05 Jan 2009 01:24:19 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=116#comment-118</guid>
		<description><![CDATA[@Jon -

1) It certainly would be interesting for the researchers or customers or anyone you suggest has suffered damages to take RapidSSL to court. The damages are not as clear to me, though that would change if you know of a case or cases when this weakness was exploited in the wild.

2) I think you are assigning a level of trust to CAs that most Internet users do not. It is pretty easy to get a certificate signed (remember the Microsoft one?), and this isn&#039;t even the easiest. In any case, nobody cares about authenticity, they just want the encrypted comm.

3) Don&#039;t forget about the intelligent adversary. It is remarkable how easily the real &#039;bad guy&#039; gets left out of the equation.

4) All non-trivial software has vulnerabilities. The world lives with it the same way the world lives with things like glass and plywood and easily picked locks on houses without suggesting the builders or the manufacturers are liable if someone breaks in.

@Security4all -

The reason researchers could get sued is that they have compromised the business process and (potentially) acted in a fraudulent manner. This is an exercise anyway, as Verisign appears generally supportive of their efforts.

Thanks for the thoughtful comments!
]]></description>
		<content:encoded><![CDATA[<p>@Jon -</p>
<p>1) It certainly would be interesting for the researchers or customers or anyone you suggest has suffered damages to take RapidSSL to court. The damages are not as clear to me, though that would change if you know of a case or cases when this weakness was exploited in the wild.</p>
<p>2) I think you are assigning a level of trust to CAs that most Internet users do not. It is pretty easy to get a certificate signed (remember the Microsoft one?), and this isn&#8217;t even the easiest. In any case, nobody cares about authenticity, they just want the encrypted comm.</p>
<p>3) Don&#8217;t forget about the intelligent adversary. It is remarkable how easily the real &#8216;bad guy&#8217; gets left out of the equation.</p>
<p>4) All non-trivial software has vulnerabilities. The world lives with it the same way the world lives with things like glass and plywood and easily picked locks on houses without suggesting the builders or the manufacturers are liable if someone breaks in.</p>
<p>@Security4all -</p>
<p>The reason researchers could get sued is that they have compromised the business process and (potentially) acted in a fraudulent manner. This is an exercise anyway, as Verisign appears generally supportive of their efforts.</p>
<p>Thanks for the thoughtful comments!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Security4all</title>
		<link>http://spiresecurity.com/?p=116&#038;cpage=1#comment-117</link>
		<dc:creator>Security4all</dc:creator>
		<pubDate>Sun, 04 Jan 2009 16:19:03 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=116#comment-117</guid>
		<description><![CDATA[I&#039;m inclined to support Jon on his response. Why would the researchers be sued? They demonstrated a proof-of-concept on a theoretical attack that was published in 2007. With clock cycles for hire (cloud computing), they warned us that the whole PKI infrastructure was in great danger because noone acted upon this &#039;old&#039; research. Time to move on from MD5.

They did contact some vendors like Mozilla and Microsoft about the issue weeks (or even months) prior to the presentation.

I saw their presentation live from the first row in Berlin. They did make a certificate and posted it online as proof of concept but they had it expire in 2004 to avoid issues and had it put on the certificate revocation list. I think they acted &#039;quite&#039; responsibly.

Set you PC clock back and test it on
https://i.broke.the.internet.and.all.i.got.was.this.t-shirt.phreedom.org/  (signed by MD5 collisions inc.)
]]></description>
		<content:encoded><![CDATA[<p>I&#8217;m inclined to support Jon on his response. Why would the researchers be sued? They demonstrated a proof-of-concept on a theoretical attack that was published in 2007. With clock cycles for hire (cloud computing), they warned us that the whole PKI infrastructure was in great danger because noone acted upon this &#8216;old&#8217; research. Time to move on from MD5.</p>
<p>They did contact some vendors like Mozilla and Microsoft about the issue weeks (or even months) prior to the presentation.</p>
<p>I saw their presentation live from the first row in Berlin. They did make a certificate and posted it online as proof of concept but they had it expire in 2004 to avoid issues and had it put on the certificate revocation list. I think they acted &#8216;quite&#8217; responsibly.</p>
<p>Set you PC clock back and test it on<br />
<a href="https://i.broke.the.internet.and.all.i.got.was.this.t-shirt.phreedom.org/" rel="nofollow">https://i.broke.the.internet.and.all.i.got.was.this.t-shirt.phreedom.org/</a>  (signed by MD5 collisions inc.)</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jon</title>
		<link>http://spiresecurity.com/?p=116&#038;cpage=1#comment-116</link>
		<dc:creator>Jon</dc:creator>
		<pubDate>Sun, 04 Jan 2009 14:28:31 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=116#comment-116</guid>
		<description><![CDATA[Pete,

Shouldn&#039;t the CA also be liable to the customers (and non-customers because of the intrinsic risk) because they knowingly withheld a security update to their service that was exposed is academia almost two years prior? [1].  Doesn&#039;t a CA have a higher level of responsibility again because one weak CA weakens all CAs, including the responsible ones that at a minimum stopped using MD5 for signing?  Or, to make your argument more logically consistent, wouldn&#039;t the authors of [1] be more liable than the group that showed the flaw, since the cat was out of the bag in the paper?  (Although, there&#039;s overlap between the authors and members of the two groups.) Or, do you differentiate between theoretical risk and empirical risk, and if so, why?  Or, heck, go back to 2004 and sue the authors of the first MD5 paper on collisions [2].  They showed that MD5 was weak to begin with.

Before any researchers even are considered in litigation, I would like to see the CA be penalized.  At a minimum, their CA cert should have been (or can still be) revoked from all browsers.  We, as in the Internet community, have no way to trust them when they say their CA was not compromised from any prior attacks, even though the information was in the public court since 2007 and weaknesses were known since 2004.  This demonstration should have not even been able to occur, in my opinion, if the CA acted more responsibly and heeded the warnings in the 2007 paper: &quot;Therefore we repeat, with more urgency, our recommendation that MD5 is no longer used in new X.509 certificates.&quot; Or, the CA could have even implemented a work-around: &quot;Obviously, the attack becomes effectively impossible if the CA adds a sufficient amount of fresh randomness to the certificate ﬁelds before the public key, such as in the serial number (as some already do, though probably for different reasons).&quot;

When do vendors become responsible for not responding to publicly-known flaws that can impact any Internet user and not just the vendor&#039;s customer base?


[1] &quot;Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities&quot;, Feb. 2007
[2] &quot;Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD&quot;, August 2004
]]></description>
		<content:encoded><![CDATA[<p>Pete,</p>
<p>Shouldn&#8217;t the CA also be liable to the customers (and non-customers because of the intrinsic risk) because they knowingly withheld a security update to their service that was exposed is academia almost two years prior? [1].  Doesn&#8217;t a CA have a higher level of responsibility again because one weak CA weakens all CAs, including the responsible ones that at a minimum stopped using MD5 for signing?  Or, to make your argument more logically consistent, wouldn&#8217;t the authors of [1] be more liable than the group that showed the flaw, since the cat was out of the bag in the paper?  (Although, there&#8217;s overlap between the authors and members of the two groups.) Or, do you differentiate between theoretical risk and empirical risk, and if so, why?  Or, heck, go back to 2004 and sue the authors of the first MD5 paper on collisions [2].  They showed that MD5 was weak to begin with.</p>
<p>Before any researchers even are considered in litigation, I would like to see the CA be penalized.  At a minimum, their CA cert should have been (or can still be) revoked from all browsers.  We, as in the Internet community, have no way to trust them when they say their CA was not compromised from any prior attacks, even though the information was in the public court since 2007 and weaknesses were known since 2004.  This demonstration should have not even been able to occur, in my opinion, if the CA acted more responsibly and heeded the warnings in the 2007 paper: &#8220;Therefore we repeat, with more urgency, our recommendation that MD5 is no longer used in new X.509 certificates.&#8221; Or, the CA could have even implemented a work-around: &#8220;Obviously, the attack becomes effectively impossible if the CA adds a sufficient amount of fresh randomness to the certificate ﬁelds before the public key, such as in the serial number (as some already do, though probably for different reasons).&#8221;</p>
<p>When do vendors become responsible for not responding to publicly-known flaws that can impact any Internet user and not just the vendor&#8217;s customer base?</p>
<p>[1] &#8220;Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities&#8221;, Feb. 2007<br />
[2] &#8220;Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD&#8221;, August 2004</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=116&#038;cpage=1#comment-115</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Sun, 04 Jan 2009 03:37:13 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=116#comment-115</guid>
		<description><![CDATA[@ferg -

No, I am not kidding. What kind of favor was done and who is the community you are talking about?

Thanks,

Pete
]]></description>
		<content:encoded><![CDATA[<p>@ferg -</p>
<p>No, I am not kidding. What kind of favor was done and who is the community you are talking about?</p>
<p>Thanks,</p>
<p>Pete</p>
]]></content:encoded>
	</item>
</channel>
</rss>
