keybase / keybase-issues

A single repo for managing publicly recognized issues with the keybase client, installer, and website.
899 stars 37 forks source link

SSL certificate web of trust feature? #604

Open gspr opened 10 years ago

gspr commented 10 years ago

Nice project you have going! How about adding functionality for growing an SSL certificate web of trust? Imagine going to a HTTPS site and having a browser plugin say "the certificate presented by the site is trusted by 5 of your Keybase contacts", or something like that. Anything that will help us get rid of CAs is a win in my book…

i-rme commented 10 years ago

I believe that this should not be added to this project, in my opinion that is task of other software. Most people trust all CAs

gspr commented 10 years ago

While I can agree that this might be outside the scope of the project, the fact that "most people trust all CAs" is precisely my point: they shouldn't! Why should "most people" trust "TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş." (included in Firefox by default)? I certainly have no idea who these guys are. I also have very few ways to convince myself that I should ever trust them.

graphiclunarkid commented 10 years ago

I believe this is one goal of the Monkeysphere project, so if Keybase chooses to implement such a feature, it would be great to consider compatibility between the two.

zQueal commented 10 years ago

I believe the overall scope of Keybase is the very reason why this will not be implemented. The attraction of Keybase is that users without any experience in PGP can now, with relative ease be introduced to the methodology. In the same respect, malicious parties could simply trust any given website (in large numbers) and the inexperienced would be coerced into believing that a potentially malicious website could be totally harmless.

I'll throw your own reasoning back at you; if people shouldn't trust CA's, then why should they trust the general consensus of others?

I certainly have no idea who these guys are.

You would also have no idea who the other Keybase users are (personally), so you by your own logic you shouldn't be trusting them, either.

graphiclunarkid commented 10 years ago

I think my trust in a site's SSL certificate would increase if I saw a message like the one @gspr suggested: "the certificate presented by the site is trusted by 5 people you track on Keybase" (emphasis added). In this way it works as a web of trust for SSL certificates and not the general consensus of a bunch of people you don't know. Maybe that would only work if you're only tracking people you know though.

Compare with: having a copy of someone's public key versus signing that key with yours. The former doesn't indicate trust but the latter does.

Hmm... what does it mean, in terms of trust, to "track" someone on keybase?

zQueal commented 10 years ago

the certificate presented by the site is trusted by 5 people you track on Keybase

That would change things considerably. If random users who you have no idea who they are, are trusting websites and I'm supposed to be "Okay, this person think's this website is fine, so it probably is!" is way different from "@maxtaco and @malgorithms both agree that this website is safe and trusted!"

This would put an emphasis to only track those you either personally know, or personally know of.

Hmm... what does it mean, in terms of trust, to "track" someone on keybase?

You can read much more on tracking in #100; specifically this post.

ghost commented 10 years ago

Most people trust all CAs

In fact I am joining this thread because the website proofer appears not to trust CACert-chained SSL certificates, and failed over to HTTP.

maxtaco commented 10 years ago

@talexand At this point, it's likely a bug in your setup, but it could still be a bug in ours. What's the hostname?

ghost commented 10 years ago

hitono.info

SHA1 fingerprint of cert: EA:37:C1:CD:39:2A:AC:D8:ED:F7:46:54:CC:1D:F8:09:15:6C:F2:69

maxtaco commented 10 years ago

There's no A record for hitono.info, but I did find one for www.hitono.info. Visiting https://www.hitono.info in Chrome, Firefox and Safari gives me an SSL cert warning. Our proof checker is failing for the same reason(s).

ghost commented 10 years ago

Sorry, I should have added the www prefix.

As I understand it, CACert hasn't complied with major browser root CA inclusion policies, but has a root included in OpenBSD, for example. Thus, importing the CACert root into your local machine solves the cert warning problem with my domain.

Is Keybase planning to rely on browser standards for site verification in general, or will there be a workaround/WoT addon (to stay on thread topic)?

maxtaco commented 10 years ago

Oh sorry, I missed the CACert part above. This has come up in the past, and so far we haven't included CAcert.

We're not planning any changes here in the near-future. Probably we'll be adding more proof types (FB,Reddit,BitBucket, etc...) first. It's a pretty small set of users who use CACert and the current workaround is just to fallback to HTTP or DNS.

ghost commented 10 years ago

DNS record sounds like an okay workaround. Thanks.