Risk management, Gervase.  If a company/domain-owner can securely
identify what CA they use, that prevents any other CA -- even one who
ends up inadvertently issuing certificates contrary to their CPS --
from causing damage, and thus lowers the risk of any individual CA
that may be in any given browser from blundering.  These lists of CAs
are huge, and protecting from 120 possible threats by denying all by
default and adding explicitly-trusted-by-server-to-identify-server CAs
to the "allowed" list one at a time... well, let's just say that it's
a lot harder to get an inside man into one specific company than it is
to get an inside man into any of the companies on the list.

(And since the list of "trusted" CAs on the client is unknown, it's
entirely possible that the Chinese Firewall exists -- a bunch of proxy
servers that are trusted for every domain in the world.  If one could
signal that the only acceptable CA for the domain was not Chinese
Firewall-type, then one could know that, for example, you'd never have
to worry about the Chinese police trying to extradite you for speech
which is free in your country, but which is anathema in that country.)

...but then again, with the Chinese Firewall theory, you also get the
Brain In A Vat scenario, where you'd never be able to tell if your
input was bogus.

-Kyle H

On 8/18/06, Gervase Markham <[EMAIL PROTECTED]> wrote:
Balint Balogh wrote:
> Without this security measure, any CA that has its certificates in client
> software has the power to thwart SSL/TLS security by issuing fake certificates
> claiming to belong to *.example.com servers or email addresses.

If you think they might do that, why might they not do it for other
domains your users use (e.g. their bank)?

Surely you either believe a CA is trustworthy to correctly issue
certificates for websites or it isn't?

Or are you concerned that a rogue employee at an otherwise honest CA
will have a particular wish to undermine your company and employees and
will cause a single bogus certificate to be issued as part of his
campaign to target you?

Gerv
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto



--

-Kyle H
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to