Gervase Markham wrote:
> Eddy Nigg (StartCom Ltd.) wrote:
>   
>> So it would be fine with you, if you've received a signed document or 
>> email (even encrypted) and you are going to trust your VISA and other 
>> personal data to a spoofed email or web site, issued by such a Blackbox 
>> CA? 
>>     
>
> It wouldn't be fine with me; my point is that (speaking as the Mozilla 
> Project) it's Not Our Problem. 
LOL.....of course it's your problem, because you know upfront that any 
such CA is potentially compromised right from the start. If this CA gets 
accepted without requiring changes to their commitment and procedures, 
this is exactly what Mozilla is going to approve - knowingly and 
willingly! In this case Mozilla will breach indirectly its own policy 
perhaps the first time - because adherence to various parts of the 
conditions put forward in that policy can't be even assumed.
> When the customer finds out there's a 
> problem, he should revoke his cert, and our products should honour the 
> revocation - just as for any compromised cert.
The customer is the one which hasn't cared for securing adequately in 
first place, the issuing CA being the one not bothering to control its 
intermediate CAs...and you still believe that they A) Find out about an 
intrusion and compromise, B) Also bother to revoke it (with all the 
hassle which might be involved? This makes me laugh...
>
> You don't need to invent a long scenario. Simply: disgruntled bank 
> employee steals private key and, using it, steals customer data. How is 
> this different to them stealing the private key for the bank's email 
> signing cert? Or web server cert?
>   
That's "The One Private Key Of The One Server" compared to any kind of 
issued certificates, possibly without leaving a trail to whom it was 
issued...and most likely there isn't "The One And Only Email Cert Of The 
Bank", but perhaps hundreds of them...
> The point is, it's not the problem of the Mozilla Foundation to make 
> sure that the First International Bank of Thailand has good security, as 
> long as any breaches of it can only affect the FIBOT and its customers.
>   
It can affect anybody! I'm not aware that there is a limitation placed 
who can be a relying party...
>
> Yeah, life sucks, doesn't it?
>   
Oh no, I don't think so ;-)
> All of your scenario could still happen if we forced the CA to make the 
> FIBOT sign some contract about keeping their key safe. 
No, there is a contract between the two parties. However nobody is going 
to control and verify the implementation of that contract. That's my 
point here.
> Just because 
> there's a contract doesn't mean the FIBOT would keep to it; even if they 
> did, that doesn't mean that no insider has a copy of the private key.
>   
But if the CA verifies the procedures in place for securing the CA 
system, access control systems and regulations (preferable foolproof as 
possible), create the private key together with a representative of the 
CA together with other witnesses (called a signing party in CA jargon), 
than one can expect a better and more secure system out there. Of course 
I'm touching here only the basics of proper subordinate CA 
implementations hosted at an external location.


-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to