lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1259854092-1108323007-cardhu_blackberry.rim.net-30060-@engine133>
From: jasonc at science.org (Jason Coombs)
Subject: [lists] Re: Administrivia: List Compromised
	dueto MailmanVulnerability

Valid ... Invalid ... Nonsense.

The only meaningful thing the engine could do is check whether the certificate is the certificate it is supposed to be by looking at the public key contained therein.

A public key that has never before been seen in the real world, by anyone, anywhere, is a threat until proved otherwise. A public key that we have never seen before should not be trusted automatically, even if somebody else has encountered it in the past.

No change of public key should be allowed without human intervention to rationalize the legitimacy of the change. Automated 'Valid' / 'Invalid' determinations are absurd where there is a different public key that was trusted instead for the same entity in the past.

We need systems that warn us of key changes and give us the opportunity to pick up the phone or walk down the hall and find out why the entity we trust was forced to abandon a perfectly good key pair in favor of another.

Regards,

Jason Coombs
jasonc@...ence.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ