Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Convergence (SSL)

From Wikipedia, the free encyclopedia
Proposed strategy for replacing SSL certificate authorities
Convergence
Original authorMoxie Marlinspike
Initial release2011
Final release
client-0.09[1] Edit this on Wikidata / 2 January 2012; 14 years ago (2 January 2012)
Written inPython, JavaScript
Operating systemWindows, OS X, Linux
Available inEnglish
TypeWeb browsing
LicenseGPLv3
WebsiteSeeArchived 3 August 2016 at theWayback Machine
Repository

Convergence was a proposed strategy for replacingSSLcertificate authorities, first put forth byMoxie Marlinspike in August 2011 while giving a talk titled "SSL and the Future of Authenticity" at theBlack Hat security conference.[2] It was demonstrated with aFirefox addon and a server-side notarydaemon.

In the talk, Marlinspike proposed that all of the current problems with the certificate authority (CA) system could be reduced to a single missing property, which he called "trust agility" and which Convergence aimed to provide. The strategy claimed to be agile, secure, and distributed.[3][4]

As of 2013,[5] Marlinspike was focused on anIETF proposal called TACK,[6] which was designed to be an uncontroversial first step that advocates for dynamic certificate pinning instead of full CA replacement and reduces the number of times a third party needs to be trusted.[7][8]

Development of Convergence was continued in a "Convergence Extra" fork until about 2014.[9][independent source needed]

Background

[edit]

Convergence was based on previous work from the Perspectives Project atCarnegie Mellon University. Like Perspectives, Convergence authenticated connections by contacting external notaries, but unlike Perspectives, Convergence notaries could use a number of different strategies beyond network perspective in order to reach a verdict.

Convergence in comparison to conventional SSL

[edit]

The purpose of acertificate authority in the conventionalSSL system is to vouch for the identity of a site, by checking its SSL certificate. Without some vouchsafing, one is open to aman-in-the-middle attack. A single site is vouched for by only a single certificate authority (CA), and this CA has to be trusted by the user. Web browsers typically include a list of default trusted CAs and display a warning about an "untrusted connection" when a site cannot be vouchsafed by a trusted CA. A problem with this system is that if a user (or browser vendor) loses trust in a CA, removing the CA from the browser's list of trusted authorities means losing trust in all the sites that used that CA. This happened when major browsers lost trust in theDigiNotar CA[10] and sites registered with this CA had to get new certificate authorities (seeCertificate authority#CA compromise for more examples of trust breaches).

With Convergence, however, there was a level ofredundancy, and nosingle point of failure. Severalnotaries could vouch for a single site. A user could choose to trust several notaries, most of which would vouch for the same sites. If the notaries disagreed on whether a site's identity was correct, the user could choose to go with themajority vote, or err on the side of caution and demand that all notaries agree, or be content with a single notary (the voting method was controlled with a setting in the browser addon). If a user chose to distrust a certain notary, a non-malicious site could still be trusted as long as the remaining trusted notaries trusted it; thus there was no longer a single point of failure.

In September 2011,Qualys announced it would run two notary servers.[11] As of June, 2016 these servers appeared to be down.[12] A list of notaries was maintained on the Convergence wiki.[13]

Alternatives

[edit]
  • TheMonkeysphere Project tries to solve the same problem by using thePGPweb of trust model to assess the authenticity of https certificates.[14]
  • HTTP Public Key Pinning is a security mechanism which allows HTTPS websites to resist impersonation by attackers using mis-issued or otherwise fraudulent certificates.

References

[edit]
  1. ^moxie0."Release client-0.09 · moxie0/Convergence". Retrieved17 August 2025.{{cite web}}: CS1 maint: numeric names: authors list (link)
  2. ^"SSL And The Future Of Authenticity".YouTube.
  3. ^Schwartz, Mathew J. (2011-09-30)."New SSL Alternative: Support Grows For Convergence".InformationWeek. UBM. Archived fromthe original on 2011-10-01. Retrieved2016-09-25.
  4. ^Messmer, Ellen (2011-10-12)."The SSL certificate industry can and should be replaced".Network World. IDG. Archived fromthe original on 2014-03-01. Retrieved2016-09-25.
  5. ^Marlinspike, Moxie [@moxie] (2013-02-18)."@deviantollam Unfortunately it's not possible to develop a convergence chrome extension. We've been focusing more on http://tack.io" (Tweet) – viaTwitter.
  6. ^"Trust Assertions for Certificate Keys".Archived from the original on 2018-09-04. Retrieved2019-06-19.
  7. ^Fisher, Dennis (2012-05-30)."Moxie Marlinspike on TACK, Convergence and Trust Agility".ThreatPost.
  8. ^Marlinspike, Moxie (October 2012)."Trevor Perrin and I are actually making..."Hacker News (Forum). Retrieved2016-09-24.
  9. ^"mk-fg/convergence". August 27, 2020 – via GitHub.
  10. ^Goodin, Dan."Dutch CA banished for life from Chrome, Firefox".www.theregister.com.
  11. ^"SSL Labs: Announcing launch of two Convergence notaries".Qualys Security Blog. September 29, 2011.
  12. ^U.S. notary server:https://www.ssllabs.com/convergence/notary-us.convergence.qualys.com.notary[permanent dead link]
  13. ^"moxie0/Convergence".GitHub.
  14. ^Fuchs, Karl-Peter; Herrmann, Dominik; Micheloni, Andrea; Federrath, Hannes (2015-02-18)."Laribus: privacy-preserving detection of fake SSL certificates with a social P2P notary network".EURASIP Journal on Information Security.2015.doi:10.1186/s13635-014-0018-0.S2CID 3746068. Retrieved2019-12-20.

External links

[edit]
Protocols and technologies
Public-key infrastructure
See also
History
Implementations
Notaries
Vulnerabilities
Theory
Cipher
Protocol
Implementation
Retrieved from "https://en.wikipedia.org/w/index.php?title=Convergence_(SSL)&oldid=1306389374"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp