[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #29628 [Applications/Tor Browser]: Distrust DarkMatter Intermediate CAs
#29628: Distrust DarkMatter Intermediate CAs
--------------------------------------+--------------------------
Reporter: nsuchy | Owner: tbb-team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Major | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Changes (by sysrqb):
* priority: Immediate => Medium
* severity: Critical => Major
Comment:
You may find the entire thread discussing this topic enlightening. I am
personally in support of Mozilla denying the root inclusion request and
revoking their intermediate CA certificate. However, as it was said
numerous times in the discussion thread, the only reason we know
DarkMatter have these CA certificates is because they applied for root
inclusion - in a public forum. It is very easy for a malicious
organization to obtain an intermediate CA certificate without that
certificate being attributable to them. As far as anyone knows (publicly),
DarkMatter haven't used their current Intermediate CA with malicious
intent, yet(!). If DarkMatter use their CA for malicious purpose in the
future and that malicious activity is detected, then their intermediate CA
certificate should be revoked by DigiCert (and therefore they lose their
trusted position globally). The current question is whether Mozilla should
pre-emptively revoke DarkMatter's Intermediate certificate and reject
their current root.
The Tor Project isn't in a position where we can successfully audit all
anchor and intermediate CAs included in Mozilla's root store. And, even if
we could, we likely wouldn't be able to maintain that long-term. We can
distrust DarkMatter's current intermediate, but given the previous
statement about how Intermediate CAs certificates can be obtained
relatively easily under alternative-names, I don't know if this is a
winning solution. In reality, distrusting one intermediate CA is likely
pointless, other than making a political statement.
I'll leave this open, in case anyone else on the team has more input here.
https://groups.google.com/d/msg/mozilla.dev.security.policy/nnLVNfqgz7g/YiybcXciBQAJ
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29628#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs