[Cryptography] New SSL/TLS certs to each live no longer than 47 days by 2029
iang
iang at iang.org
Sat Apr 19 19:55:01 EDT 2025
Answering both, but especially Jerry's rhetorical question. It comes in two flavours.
1. The history of SSL. It originally came out of Netscape as an ADH protocol in version 1. Much outcry and anger "what about the dreaded MITM? You must use certificates, you really must! Plague & Pestilence, 7 years bad luck!" Much of this opposition could be traced back to a little company called RSADSI, which just so happened to have invested hugely in a little technology called x.509.
So Netscape, duly chastened, came out with SSL v2, and started to issue certificates to server operators. "Oh, no, this cannot be so! You cannot be the CA, because <windmilling> conflict of interest, vetting, decentralization, you don't understand certs, now you're the MITM, angst, the web will collapse </arms>" Again, the little company RSADSI seemed to be very vocal on this, and had apparently started another little company who's name escapes me, and the boss was holding 15% of the shares...
In the third act, Netscape weakened and allowed other companies to become CAs and push it out of the business. But for a glorious moment before shareholder value saved us, the browser vendor was the CA.
2. Other CAs came along too, because the first whose name is now lost in history was high priced. Something in Africa, which was bought out by the high priced guys? So Netscape and other browser manufacturers created a 'root list' of CAs. And added CAs as they turned up. For a while it was free for all. Then it was about who you knew. Opera charged $8k at one point and you were in! Microsoft copied others. And others didn't know how to add... (Then CAcert came along with free certs and this sparked the CAs to huddle the waggons in a circle and create CABCartel and the rest is history...)
But from a helicoptor view, the addition of the CA to the root list was just a procedural item. Which is the same as the writing of a cert to a customer of the CA - a procedural item.
So in effect, the browser manufacturers were CAs. They just used a different protocol to sign sub-CAs in to their certified list (aka root list).
For a while I called these über-CAs but the term never caught on, I wonder why?
In sum - browser makers are CAs, they were CAs, and they can be CAs, we just can't say that, and those über-CAs have to use a different protocol to do it. And, this complication would have been folded in and disappeared if it weren't for a little company whose name I forgot that managed to insert itself into an otherwise simple process and create a dog's breakfast of security but a sustainable number printing money machine for itself.
iang
On 19/04/2025 16:34, Michael Kjörling wrote:
> On 18 Apr 2025 19:28 -0400, from
> leichter at lrw.com
> (Jerry Leichter):
>
>> Pulling this all together: Why aren't any browser makers also CA's?
>
> Apple is a CA, at least according to themselves.
>
> Google is a CA, at least according to themselves, Microsoft and Mozilla.
>
> Microsoft is a CA, according to themselves, Apple, Google and Mozilla.
>
> Mozilla is the only one that doesn't seem to be trusted as a CA by any
> of the major browser makers, but I won't rule out that I'm searching
> for the wrong thing.
>
> I'm pretty sure as someone controlling a host name you can get an
> actual TLS certificate at least from Google.
>
> Apple's list of currently trusted CAs:
> https://support.apple.com/en-us/121672
> linked from
> https://support.apple.com/en-us/103272
> Google's:
> https://chromium.googlesource.com/chromium/src/+/main/net/data/ssl/chrome_root_store/root_store.md
> linked from
> https://pkic.org/ltl/
> Microsoft's:
> https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT
> linked from
> https://learn.microsoft.com/en-us/security/trusted-root/participants-list
> Mozilla's:
> https://ccadb.my.salesforce-sites.com/mozilla/CACertificatesInFirefoxReport
> linked from
> https://wiki.mozilla.org/CA/Included_Certificates
> --
> Michael Kjörling
> 🔗
> https://michael.kjorling.se
> _______________________________________________
> The cryptography mailing list
> cryptography at metzdowd.com
>
> https://www.metzdowd.com/mailman/listinfo/cryptography
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20250419/a7dc794a/attachment.htm>
More information about the cryptography
mailing list