At 6:06 PM +0100 5/24/07, Gervase Markham wrote:
>Paul Hoffman wrote:
>  > That makes the assumption that all domains from those countries are in
>>  the countries' TLDs; that is a bad assumption.
>
>You mean that these CAs will not be able to sign certificates for some
>sites that they might want to (e.g. www.myfrenchsite.com)? Yes, but
>that's just tough on them.

My feeling is that we would be better off not making this leap of 
limitation. Either someone is allowed to certify in all domain names, 
or in none.

I worry that we are opening ourselves to some tricky politics. For 
example, what if the government of China insisted that Mozilla not 
allow VeriSign to certify for names in .cn? Don't laugh, they at one 
point demanded that VeriSign not allow IDN domain names in Chinese in 
.com. More salient and worrisome, what if we allow in a CA run by the 
government of Iran, and the USGovt demanded that Mozilla not allow 
them to issue certs for names in the .us TLD?

The easiest way to avoid such problems is to not get into the 
business of subsetting which domains a CA is allowed to use in the 
identifiers.

>  > I propose that we simply do not allow classified audits. Those two CAs
>>  can get additional, non-classified audits if they want to be in the root
>>  store.
>
>That's certainly the alternative. However, I believe at least the French
>argued that they couldn't get a commercial audit for some reason or
>another. But my memory may be misleading me.

Even if true, I think saying "that's just tough on them" in this case 
is a better policy for Mozilla than to do subsetting based on TLDs 
and say "that's just tough on them" for the subset. From a security 
perspective, having a "classified" audit (that is, one you can't 
read) is much worse than us trying to guess which TLDs someone is 
able to use in identifiers.

>  > If FubarSign came to us with a "classified" audit from a commercial
>>  auditor, would we even consider it?
>
>No.
>
>  > Why should countries be different than commercial entities?
>
>Because they have jurisdiction over their citizens, and (in direct or
>indirect ways) over their TLD.

KISA has as much jurisdiction over Korean citizens as NIST has over 
US citizens: nearly none.

>If the Austrian Government CA comes and
>says "We have ten million Austrian citizens using our email certs;
>please add our root to Thunderbird", who would we ask to audit them?

Yes

>A
>better solution, surely, is to add it but allow them to sign only .at
>addresses.

We disagree here. I feel that a better solution is to treat them like 
all other CAs from a trust and security perspective.

BTW, thank you for bringing up that example. It opens up a great can of worms:

-If the Austrians get their un-audited root cert in the Mozilla store 
for user identity certs, how do we know that they are only issuing 
them to Austrian citizens? Would we even restrict them to that? What 
about dual citizenship people?

-If the Austrian government says "we designate this commercial entity 
to issue email certs", do we treat that CA under the government rules 
or the commercial rules?

-If we go down the path of restricting by TLD, we certainly need to 
have the same restrictions in the email address as we do in the 
domain name. Will the extensions being added handle this?

At 12:19 PM +0100 5/25/07, Gervase Markham wrote:
>Frank Hecker wrote:
>  > So the question is, if a government CA provided a statement roughly
>>  equivalent to the (public) WebTrust report, would that ...
>...snip...
>  > general level of confidence in the organization doing the evaluation as
>>  we would with a typical WebTrust-authorized auditor.
>
>So, to summarise, we need:
>
>A) An audit to an approved standard, listed in policy section 8
>B) Performed by a competent and independent body in which we have
>     confidence, with criteria listed in policy section 9 and 10
>C) Which makes a public statement to that effect
>
>?
>
>And there is no reason that the body in B) should not be a government or
>government-appointed, as long as we continue to have confidence in them.
>We are allowed to refuse any CA for any reason under policy section 4.
>
>OK, I can buy that.

I can buy that with you.

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to