• 6 Posts
  • 185 Comments
Joined 1 year ago
cake
Cake day: June 21st, 2024

help-circle
  • The maintainers of the big web browsers have pretty strict rules for CAs in this list. If any one of them gets caught issuing only one certificate maliciously, they are out of business.

    And all CAs are required to publish each certificate in multiple public, cryptographically signed ledgers.

    Sure, there is a history of CAs issuing certificates to people that shouldn’t have them (e.g. for espionage), but that is almost impossible now.




  • No, these are completely separate issues.

    • CRL: protect against certificates that have their private key compromised
    • CT: protect against incompetent or malicious Certificate Authorities.

    This is just one example why we have certificate transparency. Revocation wouldn’t be useful if it isn’t even known which certificates need revocation.

    The National Informatics Centre (NIC) of India, a subordinate CA of the Indian Controller of Certifying Authorities (India CCA), issues rogue certificates for Google and Yahoo domains. NIC claims that their issuance process was compromised and that only four certificates were misissued. However, Google is aware of misissued certificates not reported by NIC, so it can only be assumed that the scope of the breach is unknown.

    Source