Honestly? The concept of "vetting by a third party" really doesn't mean anything to those who choose to deal with things themselves, and it especially doesn't mean anything to those who believe that the fundamental concept of X.509 certificates, as applied by the people who developed the SSL protocol, is fundamentally fucked up.
I don't need to pay a third party to have a random conversation with someone on the street. I don't need to pay a third party to give a flyer to anyone I meet on the street. I don't need to rely on a third-party "vetting" process to have a random conversation with someone on the street. I don't even need to ask for a government-issued ID to have a random conversation with someone on the street. And you know what? I DON'T WANT TO. I don't want to do this on the web, either. I don't care if you or anyone else thinks that this makes it better for the drooling computer and security-illiterate masses, I choose not to. I don't get that security dialog if I communicate via plain-text (non-https); if I happen to want to have a private conversation with the same person (the same site and IP), why the hell do I need a third party to step in and say "it's dangerous if you don't have something that I'VE VETTED" (or worse, "it's insanely dangerous if you don't have something that WE'VE VETTED"? It's arguably less dangerous to do unauthenticated TLS than non-encrypted web browsing, but the dialog as it's currently implemented arguably destroys any faith in the ability of the computer system to be a tool that we use, rather than a paradigm that controls us. It destroys our ability to trust. And you know what, that's the business that CAs are in, either giving away limited amounts of trust or selling the same. CAs have entirely too much power under the currently dominant paradigm -- they can choose to embed or withhold any X.509v3 extension that they want in the certificates that they issue, and the person they issue them to has absolutely no say in the matter. A web certificate, which (at least from GoDaddy and others) includes both "network client" and "network server" extensions, can be used in either capacity -- but it can't be used to sign software packages that people can choose to trust, it can't be used to sign PDF documents, it can't be used for email authentication, it can't be used for anything that isn't explicitly embedded into the certificate by the CA. "Get another browser, then! Build your own from the Mozilla sources! Just don't call it Firefox!" I can hear the cries. Unfortunately, it's just not that simple. Do YOU want to have to open up another browser, another piece of software to clutter up your taskbar and desktop, just to be able to communicate the same fucking protocol as Firefox? I sure as hell don't. But more importantly, /I also don't want to have to support people who want to have a private conversation with me to the point of having to tell them to download and install another piece of software on their computers just to enable a conversation/. I'm already having major problems trying to find a single piece of software that works for instant messaging and video chats and audio chats. Your argument doesn't hold water, Eddy. It's the same argument that Nelson and others (the entire security team) seem to use to justify their interference in everyone's conversations and interactions, their assumption of fiduciary duties without consent from the people who use their software. Firefox 2 had an easier-to-navigate security dialog than Firefox 3 (at least 'accept this certificate temporarily for this session' took only one click instead of 4, and all of its information was in a single dialog box). I'm sick of having to deal with this shit. And you know what? The reason why X.509 is completely fucked up the way it's currently implemented has to do with the trust boundaries in place, the insistance that CAs have on "implementing their policies". That's perfectly fine, as long as it doesn't impact me, or come into conflict with my policies, or the policies of those I interact with -- but it does. I have a need to segregate various groups of colleagues and friends and associates that I have, just to make my life a bit easier. I'm not going to give you all the entire list of nicknames that I have, or when I used them, just to prove a point -- I will just state that I have several nicknames, several handles, several groups of people I interact with that I have reason to not know about each other. I'm not perpetrating fraud, I'm not doing anything illegal -- I'm just ensuring that my right to free expression doesn't bleed through to cause me problems with (for example) employment. (Would a bank hire a manager who wrote erotic fiction in his or her spare time? Probably not, if the bank knew about it. And the bank would probably fire said manager if they found out.) As a matter of information security, there are several aspects of this: 1) How do I know that any given CA has enough internal controls to ensure that none of its identity-vetting employees is going to perpetrate identity fraud on me? 2) Why the hell does ANY CA need to know who I am? Is there some secret requirement that I'm not aware of that says that the CA has to turn over to any given government or auditor (and are there internal controls sufficient there?) all the identity paperwork it has on any given person with any given public key? Is there any guarantee that there won't be such a requirement in the future, retroactive to now? (hint: the answer is "no".) 3) Why do I have to disclose all aliases that I have so that they can all be embedded into a single certificate? Or, why do I have to make part of the publicly-subpoenable record my identity information and any one or more handles that I might use? 4) What right does anyone have to say that I or anyone else must use a third-party vetting service, for any reason at all under the sun? 5) Perhaps most importantly, why can't I find a CA that will actually issue a certificate to an alias? Oh, right, because they can't meet the criteria for inclusion in Firefox or Apple's root certificate program or Microsoft's root certificate program or Opera's root certificate program or anyone else's for that matter. Conversely, the people I'd want to talk with have a problem as well. If they know me by a given handle in a given context, how the hell are they supposed to figure out who they're talking with when they're presented with a certificate that only contains my legal name, with no additional identity binding? (In the US, we have this thing called "the right of free association". As long as no crimes are being committed, we have the right to participate anonymously or pseudonymously without having to bind our legal identities to our interactions. I don't know if this is something you have in Israel, and frankly I don't care. I am being harmed, demonstrably, by this policy, because you and everyone who you've whispered into the ear of seems to think it's a given that anyone who has nothing to hide shouldn't fear identification. This viewpoint is pure and unadulterated bull flatulence -- psychic methane. It's poisonous, it leads to a self-centered "I know better than you do what you need to do and what you need to know and what you need to demand, and if you don't demand it I'm going to demand it for you EVEN IF YOU DON'T GIVE ME YOUR PERMISSION TO DO SO" viewpoint that is would be absurd if it weren't so damaging.) Nicknames have reputation. Identities have reputation. Go read http://www.identityblog.com/stories/2004/12/09/thelaws.html -- this is someone who I haven't interacted with, someone I didn't know wrote on the topic when I realized the problem. I only stumbled on this particular blog about a year or two ago, after I started realizing that each of us have different groups of people we socialize with, different identities that we use in our day to day lives. It might work for some people to have a single identity that they use everywhere -- but it doesn't work for everyone, and I'm one of those it doesn't work for. Unfortunately, the people who think that "there is only One True Identity, And That Is The Legal Identity" seem to have a hard-on for trying to ram their worldview down everyone's throat. Including mine, and the people I interact with. And I'm sick of it. -Kyle H On Mon, Nov 3, 2008 at 6:40 AM, Eddy Nigg <[EMAIL PROTECTED]> wrote: > On 11/03/2008 03:40 PM, David Stutzman: >> >> http://www.cs.uml.edu/~ntuck/mozilla/ >> >> I think we covered this before and he misses the fact that there are free >> alternatives out there like StartSSL that I use (Thanks Eddy!). >> > > You are welcome, Dave! Even though we receive a lot of credit and many > encouraging and thankful email messages, it doesn't happen so often > publicly. Thanks for that. > > Indeed this subject has been covered extensively in blogs and at Bugzilla; > it's hard to convince somebody otherwise who doesn't see the value in the > vetting by a third party. Not much to do here...except point to > https://bugzilla.mozilla.org/show_bug.cgi?id=460374 > > PS. How about using your StartSSL client certificate for your email (I > suppose you received one during registration)? :-) > > > -- > Regards > > Signer: Eddy Nigg, StartCom Ltd. > Jabber: [EMAIL PROTECTED] > Blog: https://blog.startcom.org > _______________________________________________ > dev-tech-crypto mailing list > dev-tech-crypto@lists.mozilla.org > https://lists.mozilla.org/listinfo/dev-tech-crypto > _______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto