lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100724220839.97F.0@paddy.troja.mff.cuni.cz>
Date: Sun, 25 Jul 2010 00:39:13 +0200 (CEST)
From: Pavel Kankovsky <peak@...o.troja.mff.cuni.cz>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Expired certificate

On Tue, 20 Jul 2010, Marsh Ray wrote:

> The usual logic given for this and other types of mandatory password 
> expiration schemes is that it limits the time of exposure when the 
> credentials are compromised. These days this reasoning makes less sense 
> when the attacker might only need to use his unauthorized access for 
> 50ms or so to install a persistent backdoor.

There are still other risks.

Old copies of keys (or passwords) can be disclosed accidently or during an
attack. (With the recent explosive growth of storage capacity it is a
little bit too easy to keep many old forgotten copies of sensitive files.)
Advances in cryptology and computing power can make old keys unsafe.
People may neglect to revoke certificates that have become invalid (e.g.
a personal certificate for someone who has deceased).

And of course the risk of private key being stolen and being abused even
after the compromised system has been cleaned up. There are situations
where it is not possible to assume the other party is able to keep an up
to date copy of CRL and check it (moreover, the lack of expiration date
would make CRLs grow beyond any limit).

> Drivers licenses, (as Pavel said) passports, most kinds of real-world
> credentials expire. In the computer field we deal with 10+ orders of
> magnitude on the time axis (10 years vs 100 ms) so normal policies don't
> scale well.

Even in the realm of passports et al. 10 years is way too long to prevent
abuse. But it helps to reduce the number of documents that might be
accepted as valid despite having been lost or stolen, carrying photographs
too old to allow reliable verification or containing information that is
not valid any longer.

The problem is a conflict between security and convenience.

Ironically, online communication allows a rather elegant solution: you can
have a hierarchy of certificates starting with short-lived certs for
routine operation issued online by the lowest level of intermediate CAs
with each level offering less automation to reduce exposure and longer
lifetimes to make up for lost convenience.

Unfortunately, this approach (while being quite feasible from the
technical POV) appears to be incompatible with the business model of
existing CAs.


On Thu, 22 Jul 2010, Dan Kaminsky wrote:

> Suppose I have five hundred web servers with five hundred expiration
> dates, strewn out roughly uniformly over a three year period.  That
> means, I have about one expiration every two days.
>
> Now, to run a change: [...]
>
> Lets say this is 8 man hours.  That means this is 4,000 man hours of
> work. Assume the employee doing this work has an average cost to the
> company of $60/hr (remember, you need to roughly double the cost of a
> full time employee, after you factor in benefits, payroll taxes, etc).

If you have got 500 servers that need renewed certificates then you have 
got 500 server that need patches installed, not to mention other routine 
admin tasks. If you need 8 man hours per server to renew one certificate, 
how many man hours per server do you need to deploy one patch?


On Fri, 23 Jul 2010, Meadow wrote:

> If your organization really did have the expiration staggered at every
> 2 days, then you should take a bunch of servers (grouped by
> segment/application/whatever makes sense in your environment) and renew
> all the certs on that group of servers at once, even if they aren't all
> quite expired yet.  You should also fire your program manager.  The
> savings in labor and down-time would make up for the one-time cost of
> renewing some certs prematurely.

Many (if not most) CAs let you renew a certificate two or three months
before its expiration and give you the remaining time back. One who needs
to renew one certificate every other day can do it once in 2 or 3 months 
in batches of up to 30 or 45 renewals without losing anything.


-- 
Pavel Kankovsky aka Peak                          / Jeremiah 9:21        \
"For death is come up into our MS Windows(tm)..." \ 21st century edition /




_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ