[SSL Observatory] SSL CA compromise in the wild
Matt McCutchen
matt at mattmccutchen.net
Wed Mar 23 09:56:59 PDT 2011
On Wed, 2011-03-23 at 12:48 -0400, Steve Schultze wrote:
> SSH is just TOFU. So, the current CA model with HSTS is at least as
> good as SSH, and probably better because at least you first have to
> compromise a CA.
What? HTTP Strict Transport Security does not pin the cert (it only
prevents the user from accepting bad certs), so it is exposed to CA
compromises. SSH is not.
--
Matt
More information about the Observatory
mailing list