throwaway2037 3 days ago

This is a great point. For all of the "technically correct" arguments going on here, this one is the most practical counterpoint. Yes, in theory, Verisign (now Symantec) could issue some insane wildcard Google.com cert and send the public-private key pair to you personally. In practice, this would never happen, because it is a corporation with rules and security policies that forbid it.

Thinking deeper about it: Verisign (now Symantec) must have some insanely good security, because every black hat nation state actor would love to break into on their cert issuance servers and export a bunch of legit signed certs to run man-in-the-middle attacks against major email providers. (I'm pretty sure this already happened in Netherlands.)

3
Ajedi32 2 days ago

This isn't about the cert issuance servers, but DNS servers. If you compromise DNS then just about any CA in the world will happily issue you a cert for the compromised domain, and nobody would even be able to blame them for that because they'd just be following the DNS validation process prescribed in the BRs.

codethief 3 days ago

> every black hat nation state actor would love to break into on their cert issuance servers and export a bunch of legit signed certs to run man-in-the-middle attacks

I might be misremembering but I thought one insight from the Snowden documents was that a certain three-letter agency had already accomplished that?

9Ljdg6p8ZSzejt 3 days ago

This was DigiNotar. The breach generated around 50 certificates, including certificates for Google, Microsoft, MI6, the CIA, TOR, Mossad, Skype, Twitter, Facebook, Thawte, VeriSign, and Comodo.

Here is a nice writeup for that breach: https://www.securityweek.com/hacker-had-total-control-over-d...

9Ljdg6p8ZSzejt 2 days ago

Edits: I believe this is what you were referring to. It was around 500, not 50. Dropped a 0.

codethief 2 days ago

I do remember that breach but that was before Snowden. I'm relatively sure Snowden published some document about the NSA trying to undermine CAs, too.

tptacek 2 days ago

Verisign (Symantec) can't do anything, because the browsers distrusted them.