[Cryptography] New SSL/TLS certs to each live no longer than 47 days by 2029

iang iang at iang.org
Wed Apr 23 19:22:21 EDT 2025


On 23/04/2025 01:51, John Gilmore wrote:
> iang via cryptography <cryptography at metzdowd.com> wrote:
>> If you go back into the history of the thing, the evil MITM was like a
>> religious devil that was much talked about and never seen. And when the
>> first real MITMs turned up around 2003 (they called themselves phishers) ...
> Uh, NSA has been a "real MITM" for many decades.  Other major spying
> countries are doing this too -- both the US's "adversaries" and "allies".
>
> I agree that NSA works hard to never be seen.  Yet sometimes they ARE
> seen:
>
>    https://en.wikipedia.org/wiki/Tailored_Access_Operations#QUANTUM_attacks
>    https://en.wikipedia.org/wiki/MUSCULAR
>
> Protection against MITM attacks remains vital.


Right, if you go even further into history of the MITM what we discover 
is that various governments and militaries and TLAs did in fact employ 
MITMs whenever they felt like. This leads to to some speculations:

1. Gov / military / TLAs could employ MITMs because they had no 
liabilities - no come back. If they got caught, they simply shrugged it 
off.  Also, the stakes were somewhat higher. They weren't stealing a 
credit card, which goes for a buck, they were deploying large teams 
against other large teams, with costs in treasure of 6 figures and 
sometimes in blood.

These economics didn't work for commercial attackers. One doesn't steal 
a credit card any more, one buys them by the thousand. And even bank 
accounts are sold in batches (although stolen crypto accounts are often 
sold individually). Also, economic actors can be followed by their MITM 
if caught, they don't get to shrug it off as easily (altho they did a 
lot of shruggin with phishing, seemingly, and you could say that foreign 
attack gangs have no liabilities).

So the question remains:  would an ADH SSL solution have worked just as 
well for commercial internet?  Could users have then negotiated a 
FIDO2-like secure relationship going forward?


2. Back in the 70s and before, commercial cryptography didn't really 
exist, or it wasn't that serious, and it was heavily but quietly 
suppressed. Some time around the 80s things started to warm up with the 
invention of the message digest (so Unix password algorithms could be 
shipped without breaking export laws), DES opened up encryption, DH & 
RSA invented, and variations like Chaum.

As the academic world got into this stuff, they were drawn close and 
connected to the NSA secret world. And that world had its security 
models. And in that security model, the MITM was an important factor.

Did the commercial world of cryptography acquire its models from the 
NSA/natsec/mil world, de facto? Did we inherit our fetish for anti-MITM 
algorithms from the academics who got it from the NSA? And should we 
have re-evaluated the models & assumptions against the change in 
environment?

I'd say YES. I think it's pretty clear from our commercial cryptography 
sector that the MITM is so rare as to be questionable, whereas 
eavesdropping has a lot more track record. We are biased for a number of 
reasons towards slaying this dragon - and our historical teachings from 
the world of natsec/military cryptography is just one of them.


3. Generally I'd suggest that any commercial model draw the line at 
trying to stop the TLA/mil/natsec attack. That's a complete other fight, 
and it involves so many other considerations. It's pointless to just try 
and do that in a software protocol, it's an all-of-life process.


iang





More information about the cryptography mailing list