Skip Navigation

EU Article 45 requires that browsers trust certificate authorities appointed by governments

www.eff.org Article 45 Will Roll Back Web Security by 12 Years

The EU is poised to pass a sweeping new regulation, eIDAS 2.0. Buried deep in the text is Article 45, which returns us to the dark ages of 2011, when certificate authorities (CAs) could collaborate with governments to spy on encrypted traffic—and get away with it. Article 45 forbids browsers from...

Article 45 Will Roll Back Web Security by 12 Years

EU Article 45 requires that browsers trust certificate authorities appointed by governments::The EU is poised to pass a sweeping new regulation, eIDAS 2.0. Buried deep in the text is Article 45, which returns us to the dark ages of 2011, when certificate authorities (CAs) could collaborate with governments to spy on encrypted traffic—and get away with it. Article 45 forbids browsers from...

110

You're viewing a single thread.

110 comments
  • Can we at least admit that requiring CAs is not how ecryption in Internet should work? Just FYI there is already distributed public key infrastructure: DNS(DNSSEC).

    • You gotta love confident statements that don’t stand to scrutiny.

      DNSSEC keys are signed in the same recursive manner SSL certificates are. If I, as a government, block your access to root servers and provide you my own servers, I can spoof anything I want. It’s literally the same bloody problem.

      Chain of trust doesn’t disappear just because you use a new acronym.

      • DNSSEC keys are signed in the same recursive manner SSL certificates are.

        That's why I said there is already there is already distributed PKI.

        Chain of trust doesn’t disappear just because you use a new acronym.

        The thing with SSL, for you, as a government, one of 142 root certificates is enough to spoof on any domain, while DNS has only one root certificate and good luck getting that. And if you don't trust DNS, then who you even trust then? DNS is how major CAs check if you really own that domain. Because, you know, domains are part of DNS. Shocking, I know.

        Or you can use public keys as addresses somewhere like I2P.

        • I described a route to spoof DNS root authority that Russia and China can use already. Single root is not an advantage, it’s merely a different kind of implementation with different attack vectors.

          When it comes to security, it is better to have multiple different implementations coalesce at a point of service delivery, than have a single source of truth. If everything is delivered via DNS, there’s your tasty target for a capable adversary. If there are multiple verification mechanisms, it’s easier to tailor an attack for a specific target.

          I want cryptographic infrastructure I rely on to be the last resort for anyone capable of dealing with it.

          • I described a route to spoof DNS root authority that Russia and China can use already.

            This is not what they are doing. They cannot spoof root authority because they don't have private keys. They send unsigned replies which clients with DNSSEC will reject and client without will show blocked banner. Unless client uses DNSCrypt.

            If everything is delivered via DNS, there’s your tasty target for a capable adversary.

            As I said this news again brought up problem of CAs capable of signing any certificate in any domain. You need only one of 142 private to spoof any certificate. And as I already said, CAs already need to trust DNS. So right now we are in position, where we should trust that DNS and all 142 CAs aren't lying. If any of those 143 enities lie, all that (in)security breaks.

You've viewed 110 comments.