Security Blog

The latest news and insights from Google on security and safety on the Internet

Maintaining digital certificate security

8 Temmuz 2014
Share on Twitter Share on Facebook
Google

11 yorum :

Unknown dedi ki...

I don't think 'Certificate Transparency' is all it is made out to be.

Why Google has abandoned enforcing certificate revocation via OCSP and CRL, is beyond me. You are the only ones with the position to get the CA's to return revocation information in a timely and meaningful manner - why not do that instead?

Once CT is running, it will just be THAT much easier for all CA's and CA resellers to just tie to that system and market to all the users of those certs (thusly annoying everyone more than they do already with their scanning to get the same data). At least with scanning there is some barrier to entry and time required to do the task...

Why not Hash the domains in CT and only allow 3rd parties to request the presence of the domain via hash (or something similar)? The way it is now, you are just providing SSL Selling Parties a direct marketing list. Google seems smarter than that...

Anyway, glad that this India NIC event seems reasonably well contained, in Chrome, at least. What actions has MSFT taken to limit impact on IE users?

8 Temmuz 2014 14:05
Francophone Bose dedi ki...

Could you please clarify what do you mean by Google Domains?

9 Temmuz 2014 10:29
Unknown dedi ki...

I would like to know whether other rogue certificates found under CCA. Also, whether the others were also issued by NICCA or some other authority under CCA, and if so, which one.

10 Temmuz 2014 08:49
MLH dedi ki...

Um. So is Google still formally opposed to cert revocation checks?

10 Temmuz 2014 10:08
tlund dedi ki...

If we could migrate over to DANE, we could do away with this entire CA structure. There would be no need to "trust" these hundreds of (possibly corrupt, possibly hacked) CA:s spread over the entire world.

A good first step would be to get DANE support (back) in Chrome ;)

10 Temmuz 2014 12:12
Yago Jesus dedi ki...

Do you know SSLCop ? http://www.security-projects.com/?SSLCop

10 Temmuz 2014 13:13
Unknown dedi ki...

Google, when will you start using DNSSEC (http://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) and DNS-based Authentication of Named Entities (DANE, RFC6698) to combat such "attacks"?

10 Temmuz 2014 20:23
Unknown dedi ki...

Hello,

I was wondering how you detected the rogue certificates?

Thanks.

11 Temmuz 2014 09:40
Glen dedi ki...

Could you do this for most CAs where they have an obvious scope, especially those operated by country governments?

11 Temmuz 2014 14:00
KK dedi ki...

CCA India confirms that suspension and revocation of NIC CA has been reverted from there end but still on Chrome SSL issued by NIC and other DSCs are not working on chrome and IE. My question to Google is that why Chrome is still not allowing it...

Thanks
Kaushlesh Kumar

28 Temmuz 2014 02:35
ICS Cyber Security dedi ki...

don't think 'Certificate Transparency' is all it is made out to be.
digital certificate

16 Ağustos 2014 16:49

Yorum Gönder

  

Etiketler


  • #sharethemicincyber
  • #supplychain #security #opensource
  • AI Security
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2024
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2023
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2022
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2021
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2020
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2019
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2018
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2017
    • Ara
    • Kas
    • Eki
    • Eyl
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2016
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2015
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2014
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • Nis
    • Mar
    • Şub
    • Oca
  •     2013
    • Ara
    • Kas
    • Eki
    • Ağu
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2012
    • Ara
    • Eyl
    • Ağu
    • Haz
    • May
    • Nis
    • Mar
    • Şub
    • Oca
  •     2011
    • Ara
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • Haz
    • May
    • Nis
    • Mar
    • Şub
  •     2010
    • Kas
    • Eki
    • Eyl
    • Ağu
    • Tem
    • May
    • Nis
    • Mar
  •     2009
    • Kas
    • Eki
    • Ağu
    • Tem
    • Haz
    • Mar
  •     2008
    • Ara
    • Kas
    • Eki
    • Ağu
    • Tem
    • May
    • Şub
  •     2007
    • Kas
    • Eki
    • Eyl
    • Tem
    • Haz
    • May

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms