top | item 19673631

Ask HN: Are we killing the web by giving to much power to SSL cert authorities

37 points| elisharobinson | 6 years ago

since https has been made mandatory , are we giving to much power to ssl certificate authorities (the reputed ones)

42 comments

order
[+] mindcrash|6 years ago|reply
No, we are giving too much power to a certain tech company with a certain browser and OS which now has amassed so much power and influence, including participation in all important W3C working groups, they can basically do whatever they want.

Given the Web as-is, and its growing importance, it even makes past misconduct of a certain other big tech company in order to try and get control over the Web look like child's play.

And no, SSL cert authorities actually don't have much power at all. Everyone can be a cert authority (just make a properly set up certificate chain with something like OpenSSL and you are good to go) but the companies who have the ultimate authority by either accepting or rejecting cert authorities (or actually by accepting or rejecting their root certificates and/or control over the HSTS whitelist for global deployment) do, which brings me back to the point above.

My two cents.

[+] gmiller123456|6 years ago|reply
We really need to get rid of the crazy error message that scares users into thinking that encrypting traffic with a self signed certificate is somehow less secure than not encrypting traffic at all.
[+] ravenstine|6 years ago|reply
HTTPS is so easy to set up, whether one uses a certificate or not, that I think that HTTP should be treated as dangerous by the browser and highlighted in red. The default browser behavior should be that of HTTPS Everywhere in that it will show a warning page before letting you override it and continue to the HTTP version.

The problem is that browsers might not ever implement anything like that, even providing an unobtrusive danger warning, because so many everyday users would be scared by it or assume their browser is "broken" because their last browser didn't do that on most websites.

Regardless, that really should be the default behavior. There's simply no excuse for not providing an encrypted connection. It comes with virtually every web server out of the box.

[+] jdsully|6 years ago|reply
Being solved the in the other direction, soon all unencrypted traffic will be marked as dangerous.

FWIW the trend has been ongoing for a long time. I remember 10 years ago being frustrated I couldn't scp with the NULL cipher on my own local LAN unless I built from source.

[+] Data_Junkie|6 years ago|reply
Yeah, that's the real problem. The idea that encryption is only safe for users if the site is registered with " authority(ies) " is one of the biggest delusions going right now. Politics of fear.
[+] rolph|6 years ago|reply
I think OP concern is that an HTTP page is vilified with respect to the free pass that HTTPS gets. Is that in the right ballpark OP ?

  Browsers are set to scare people away from HTTP pages,
 insinuating HTTP is dangerous and not to be used.
there are ways of being your own CA, but you have to disseminate a root certificate to all the browsers you want to use the page.

  This can be handy, if you only need a particular group of browsers to see the page,
 and you dont care what every body else does.

  The spectre of cert revocation exists when you do HTTPS the "normal" way,
 and there are free versions as expostulated by Lorenz-Kraft.
https://en.wikipedia.org/wiki/Let%27s_Encrypt

https://letsencrypt.org/

[+] elisharobinson|6 years ago|reply
yes i can see a logical next step for state sponsored CA which can be made mandatory by isp after that only way to avoid censorship would be to use VPN but even that would be less effective if the exit node ips are known(which they are), tor will also be limited(because of barrier to entry) and the only reason its still alive is because the US gov is heavy reliant on it .... are we screwed
[+] ilaksh|6 years ago|reply
Personally I think that it's too centralized and authority-based. I am suspicious that somehow authorities may use their position to compromise security in the name of national surveillance although I don't know if it's actually possible.

There are many research projects related to content-oriented networking. Some of them have limited popularity already and are being used to host web content. It seems that may continue to increase in popularity. That would shift from transport layer security to content-oriented security. It's a different set of problems that should involve better distribution and so theoretically a more democratic power structure.

[+] Lorenz-Kraft|6 years ago|reply
Since when is https mandatory? And which kind of power we give to cert auth (except money if you are not using letsencrypt)?
[+] quickthrower2|6 years ago|reply
It's hard to justify not having https on any site. Without it you are saying "you might get the intended HTML we sent ... or maybe not if the request has been intercepted".

Any other encryption system is not natively supported by the browser so would require some kind of plug in. How would you download that plugin? https?

Using JS to encrypt is a problem because you need to securely download that JS to begin with, requiring https or similar.

[+] y4mi|6 years ago|reply
It's mandatory with http/2.

Even http/1 (which is mostly used atm ) flags any page with inputs with a big red !! Insecure !!

[+] JohnFen|6 years ago|reply
I don't know about "killing the web".

I do know that the existence cert authorities greatly undermine the notion of a chain of trust for certs. It was perhaps a necessary compromise, as there are so many certs that it isn't practical for people to verify the authenticity of them as they should, so they have to rely on someone else to do it for them.

Personally, the use of cert authorities reduces my trust in certs signed by them. I don't consider a cert trustworthy just because a CA (that isn't mine) has signed them. I consider them more trustworthy than just accepting certs without any validation at all, but that's not high praise.

I also don't accept the bundles of root certs that are provided by operating systems or web browsers. Those bundles include too many (one is too many) root certs that exist purely to allow undetected spying and MITM attacks.

I think the essential problem is that our entire cert trust mechanism is broken.

[+] __s|6 years ago|reply
No. HTTPS doesn't include NSA in its threat model. The CA system is finding a balance of diversity of CA vendors where any CA being compromised is unacceptable. HTTPS helps in situations such as: public wifi, small state actors, ISPs, domain name takeovers
[+] tracker1|6 years ago|reply
I'm a bit mixed... I wouldn't mind if DNS security were at a point where someone could just self-publish their public key to DNS, and treat it just like domain verification.

With Let's Encrypt, I think the issue is mostly addressed, I think it's harder for internal business networks though, which is where a DNS option would be of value.

Maybe limit DNS public key dist to a .lan TLD, that isn't able to be registered publicly. You have a TXT record for public-key.servername.orgname.lan then that will be used as the public key for servername.orgname.lan and the browser treats it as domain valid cert without CA.

[+] elisharobinson|6 years ago|reply
i can see great potential for miss use by state actors(both democratic and dictatorships).I can see ssl cert authorities being soft targets for censorship and/or surveillance. is my concern misplaced.
[+] lol768|6 years ago|reply
I am reassured by certifcate transparency to an extent, personally. To this end, more sites should look to deploy Expect-CT.
[+] ackfoo|6 years ago|reply
People are, on average, incredibly stupid. Some of those who aren't will inevitably take advantage of this for money and power.

When stupid people use http and see a warning, they don't think, "huh, I have no login here, provide no personal information, and the information I am receiving is not in any way critical--if it is spoofed by a bad actor, it doesn't matter" and bypass the warning. Instead, their little primitive brains do the fight-or-flight herd behaviour and click "get me out of here".

This puts the CA in the potential position of extorting money from those who must, of necessity, cater to stupid people. It also gives the CA complete control over who gets to publish their information. Forcing the need for a CA is simply totalitarianism.

The only way a CA can exist in a world where https is functionally mandatory is if legislation forces the CA to be free as in beer, fully transparent, and prohibited from arbitrary action by an appeal system that is fast, efficient, and also free as in beer.

Otherwise, we have lost everything that was good about the Web. End of story.

[+] shmooth|6 years ago|reply

[deleted]