You calculate a SHA-1 chosen prefix and you choose to attack the PGP Web-of-Trust!? Come on, forge an OCSP response from a publicly-trusted CA instead! https://www.mail-archive.com/dev-security-policy@lists.mozilla.org/msg02999.html … https://sha-mbles.github.io/
-
Show this thread
-
I haven't scanned OCSP responders in a while, but I'm sure there are still CAs signing OCSP responses with SHA-1, because it was never forbidden, and CAs will keep doing something dangerous as long as it's not forbidden.
1 reply 0 retweets 10 likesShow this thread -
Hopefully the SHA-1 OCSP responses are all signed from a sub-CA technically constrained to OCSP (as required by Mozilla policy) so it can't be used to forge an actual certificate.
1 reply 0 retweets 4 likesShow this thread -
Replying to @__agwa
Hi Andrew, I understood that the Ocsp answer must be issued from the same sub-ca that issues the final certificate... Is your sentence 100% correct? Thanks!
1 reply 0 retweets 0 likes
Yes, I'm correct. See Section 2.6 of RFC6960.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.