Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Convergence, distributed, secure strategy replacing certificate authorities (convergence.io)
51 points by 0x12 on Sept 6, 2011 | hide | past | favorite | 27 comments


Moxie Marlinspike is the creator of Convergence. I highly recommend watching his Blackhat 2011 talk (http://www.youtube.com/watch?v=Z7Wl2FW2TcA) covering authenticity on the web and Convergence.


Doubly recommended. Moxie Marlinspike is a great communicator and I suspect watching that talk will answer many questions people are likely to have.


Here is a link to a previous discussion on HN about Convergence, with some contributions by Moxie Marlinspike, the creator. http://news.ycombinator.com/item?id=2949199


The problems of certificate forgery and CA's that are too big to fail, can be fixed by extending the current system, to require certificates to be signed by multiple CA's, who do not fall under the same jurisdiction or influences. I wrote about this idea yesterday:

https://grepular.com/Solving_the_SSL_CA_Debacle_Using_Multi-...


N-of-M and co/countersigning schemes have been around forever. The problem isn't a lack of ideas or technical tools to fix it.

The problem is that the industry prefers it the way it is.


Isn't a better long-term solution to simply have DNSSEC distribute your site's public key? The idea that I have to buy a domain name and an SSL certificate is silly. For extended validation, what should be verified is your public key, not your domain. So if the public key is also signed by a number of CAs, it is considered valid.


This thing is as old as DEFCON 2011 (see http://blog.thoughtcrime.org/ssl-and-the-future-of-authentic...) but in view of current events of certificate trustworthiness, there is quite a chance for anything that can successfully replace the approach of trusting CAs.

Please view this blog entry (from the core author of convergence.io) to get the idea of also why DNSSEC is not a good approach (he had put it in the way that it's worse than CAs.)


But how do I know which DNS servers to trust?


The ones with signatures that check out. That's the SEC part of DNSSEC. The root key(s) are published and you can verify authenticity all the way down.


"Convergence, distributed, secure strategy replacing certificate authorities for users of Firefox"


New project. Get involved on GitHub. Write the Safari/Chrome version. Until browsers ship this with their main product, users will have to install plug-ins.


Won't writing a plugin for one of Safari, Chrome or Opera mean that it can be used with the other two browsers? I think they all use the same plugin standard.


I don't think so. Even though Safari and Chrome both use webkit, Chrome has a very different security model and API. Opera might be completely different.


I've ported a Chrome extension to Safari trivially, I think Opera is much the same...


One of the main security risks is social engineering.

The only reason why my mum won't be tricked into adding a rogue CA root is because it's too complicated to do for her, even if she wanted to.

* If it was as easy as installing a fake Flash plugin Trojan, she'd have installed plenty of rogue CAs already; * If it remains hard to do, she'll stick to the default config, which is what she does already.

So, the main change wrt the current PKI system is that by default, her browser would probably check a certificate validity against a couple of top authorities, rather than a single one. I guess it would make getting a certificate a couple of times more complicated, hence a couple of times more expensive (if the process of trust propagation is fully automated, then I'm no safer than with a single CA signature).

To sum up, I don't see how this would improve the situation for average Joes and Janes. Since Paypal, Amazon, Google etc. primarily care about average Joes, I don't see why they would adopt that kind of cyberpunk technology.


Google cares that governments aren't man-in-the-middling their web browser when talking to their online services.

That's how the DigiNotar breach was publicly disclosed. The browser/CA CAB forum knew about it and had been hiding it for weeks until an actual Chrome user posted a message in the Gmail support forum: https://www.google.com/support/forum/p/gmail/thread?tid=2da6...


> The browser/CA CAB forum knew about it and had been hiding it for weeks

That's really criminal.


.. which perhaps calls for collectively mette punishment.


DigiNotar knew about and hid the attack. I don't believe there is any evidence that the CA/Browser Forum knew about the attack until it was made public.


Right. Well the attacks (and emergency revocations) go back at least to March with Comodo. Vasco/Diginotar had auditors and outside security consultants in June. Maybe not CAB Forum per se, but I'm not so sure I believe that no one was notified of anything. There are likely some serious contractual disclosure obligations there, perhaps even criminal WRT the Dutch government.


> If it remains hard to do, she'll stick to the default config, which is what she does already.

The problem with the CA system is that the default config is already unsafe, let alone robust, as evidenced by major browsers hastily releasing new versions to be able to revoke trust in a single CA. Jane McNewbie goes to sleep every night without a worry on her mind while the Comodos and Diginotars of this world make mistake after mistake. Is that really so much better?

> So, the main change wrt the current PKI system is that by default, her browser would probably check a certificate validity against a couple of top authorities, rather than a single one. I guess it would make getting a certificate a couple of times more complicated, hence a couple of times more expensive (if the process of trust propagation is fully automated, then I'm no safer than with a single CA signature).

You guess? Have you actually looked at Convergence?


I think he advantage of this is that websites aren't tied to a single CA, so you can drop a root certificate without breaking them all, regardless of who actually makes the decision.

In two words, 'trust agility' as they say in the website.


Stupid question on Convergence: If I could intercept ALL the traffic from your local network, couldn't I still perform a MITM attack by simulating both the destination host and the notary?


What is the target user group of this project?

I like the idea, but I know too few people who will really start using it.


What is the target user group of this project?

People that value their internet security and are disappointed by the current SSL trust system.

I'm sure it will have to see a lot of testing by interested power users first, before it is ready for prime time / default integration into browsers.

Nevertheless, I think it is a very interesting development as it is much more realistic than the current trust system. Trust is no longer something absolute, eternal, dealt out by somehow globally fully trusted entities.


How many such people you know personally? And have they started using the system?


I don't see how that is important. This is not a popularity contest.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: