The only way that could have been implemented is if the private key is embedded in the binary. That is considered a key compromise, and CA's are *obligated* to revoke it.
-
-
Here is a relevant recent discussionhttps://groups.google.com/d/msg/mozilla.dev.security.policy/T6emeoE-lCU/-k-A2dEdAQAJ …
2 replies 1 retweet 5 likes -
Replying to @taviso @stanzillaz and
Passing this info along. Concerned about revocation. The need to communicate with localhost over https is a common problem that developers are trying to solve.
1 reply 0 retweets 2 likes -
Replying to @sraub @stanzillaz and
Yes, the most common solution is the installer generates a per-machine certificate and adds it to the local trust store.
1 reply 0 retweets 9 likes -
Well they just generated a per-machine CA and set it as fully-trusted for all purposes instead.https://www.reddit.com/r/heroesofthestorm/comments/7lb8vq/hey_blizzard_whats_the_deal_with_this_sneaky_root/ …
1 reply 0 retweets 3 likes -
Which is clearly a big "improvement"
1 reply 0 retweets 2 likes -
Not sure what you mean, that really does sound like a big improvement?
1 reply 1 retweet 4 likes -
Because they create a CA that is installed in your trusted root and set to fully-trusted for certificates of any purpose. It can generate MITM certs for any site, sign any binary, etc. Why not just a self-signed non-CA?
1 reply 0 retweets 2 likes -
It's per-machine though right? What is the attack you're thinking of? If an attacker requires Administrator, then they can already insert new roots.
1 reply 0 retweets 5 likes -
Same as AV that does this. I don't want to trust their with MITM capability. Again, why not just create a per-machine self-signed cert with subjectAlternativeName that matches http://localbattle.net and set that as trusted in normal cert store?
1 reply 0 retweets 2 likes
I guess I'm confused, you already trust them by running setup.exe. I understand if there was additional attack surface (that would be the AV complaint), but what attack surface does adding a locally generated CA add?
-
-
Why does a hotel mind if you make a duplicate copy of the room keys? They trust you with the room already.
2 replies 0 retweets 0 likes -
I suppose they mind because they don't want you to have access after you've checked out. Are you saying they might maliciously upload the key, then use it as a backdoor later? If they're malicious, there are so many better ways once you've given them Admin, no?
1 reply 0 retweets 3 likes - 7 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.