Because you're assuming that everything that occurs in this world exists in a corporate environment, Eddy. That is the environment where CAs flourish, where CAs thrive, where CAs can do what they're best at -- *because all authority and trust trickles down from the corporation, a tool used to help its workers which are acting on its behalf*.
Realistically, there is exactly one reason for third-party scrutiny: any situation which has an interest defined in law as "fiduciary" requires due diligence. Employment contracts, communications (even privileged communications, such as between an attorney and client), money, contract law, etc. This is the reason why X.509 was developed by an international consortium of governments and government contractors. This is why X.509's trust model is the way it is. This is why X.509 doesn't have any mechanism defined for a sovereign end-user to limit the amount of trust placed in any given credential or assertion. This is why X.509 doesn't allow a user to limit the policies that they're willing to accept in certificate path validation. (To be fair, some minimal nod toward this was put into the PKIX profiles, but realistically there's no implementation. In PKIX, an end-user simply does not have a certifying key, period. This means that literally everything that the end-user wishes to do must start with a "CA, may I <blank>?" question, just to get an assignation of authority -- a certificate, linking a key that the user holds to that which the user wishes to do. I don't care who you are, what interests you represent -- in 1996, the US gave up on the Clipper chip and the entire key-escrow debacle, and that was a full-fledged effort with the full, vast weight of the military, the CIA, and every law-enforcement agency (federally- and state-chartered) behind it. Do you really think that I or anyone else am going to be willing to limit our behavior to those things which an entity which isn't even a government is willing to assign authority for? I'm going to go out on a limb and suggest that I'm already well-aware of "corporate CA software which requires minimum effort". I've been following cryptography for a very long time, and I think that my position outside of the structure which has accreted since 1995 (which requires the use and imposition of a 'central identity/authentication model' simply to continue to exist, much less make any money -- and let's face it, everything which has been stated about the reasons for X.509 certificates and EV certificates is simply designed to inspire fear which makes the acceptance of such a central model much more palatable to those who allow the fear to control their decisions) allows me to see the pitfalls in the currently-dominant paradigm. "I suggest to enable users "self-organize their own networks" correctly, mitigating even their own risks!" Oddly, I have thought about this. I have espoused the ability for users to identify themselves -- either via running their own CA (their "self-signed certificates" that you are unhappy with accepting) or via their own out-of-band communication method for authenticating their own certificate thumbprints. Think about what you say, and then think about how all of the Mozilla products which use NSS makes it damnably frustrating to do so. (And since it's as easy to generate a client certificate which is signed by the user's self-signed CA certificate, you can't simply say that you would let any certificate that wasn't signed by itself have something of a pass in the trust evaluation -- it would chain to an unknown root, which would present the same issue as a self-signed root.) If you have some time, I would ask you to look at http://web.mac.com/wolfoftheair/internetpkirethought.txt . My last edit on it was 8/25/2008, according to the file modification time. (you will likely want to view the source, then turn on word-wrapping, since my text editor soft-wraps for me.) This is an attempt to use RFC 3647's CP/CPS framework to allow individual sites and groups the ability to build their own CAs, and perhaps more importantly to describe how to authenticate certificates from disparate providers that the user doesn't necessarily have knowledge of, much less any desire to assign fiduciary status to -- as well as a user-interface suggestion to reduce the stress of dealing with such untrusted identification/authentication to the absolute minimum required to allow the user to make his own access decisions (and to reduce the possibility of mis-sent messages when multiple conversations are open). At this point, I don't know of any PKIX client that actually supports policy evaluation. I'm pretty sure that NSS doesn't, and I'm also pretty sure that OpenSSL doesn't (I can't speak for other open-source projects) -- as well as being pretty sure that none of the closed-source clients I'm aware of support it either. This is where focus needs to be placed, a means of identifying what policies are being used to issue each certificate, as well as a means of policy mapping (NSS could do this by creating a "web policy", an "email policy", and a "software policy", then issuing a cross-certificate to each of its included CAs that maps the individual policy OIDs to the 'master' web/email/software OIDs -- but nobody wants Mozilla to run a CA, sigh). -Kyle H On Sat, Nov 8, 2008 at 8:05 PM, Eddy Nigg <[EMAIL PROTECTED]> wrote: > On 11/08/2008 10:50 PM, Kyle Hamilton: >> >> I would have no problem with changing the chrome when people step >> outside of the assurances that Firefox tries to provide. I /do/ have >> a problem with removing the ability for users to try to self-organize >> their own networks. (The threat model is different, the policies are >> different, and the fact that everyone on this list is talking about >> removing the ability for self-signed roots to be used at all is an >> extremely counterproductive and cartel-supporting view.) >> > > Kyle, why don't you do that the proper way, specially for corporate > networks? Creating a root and distributing the root is the proper way to go, > not some lousy self-signed crap you never ever will verify anyway. > > I'm not against somebody being his own CA - not wanting to depend on others, > but I'm against risking others by their actions. I think by creating your > own root and by distributing it throughout your network and affected > circles, you provide a certain protection level self-signed can't. You may > even issue CRLs. Others which encounter a site without having imported the > root (currently) still can accept the cert. > > There is open source software out there which provide excellent support for > setting up a corporate CA which requires minimum effort. I suggest to enable > users "self-organize their own networks" correctly, mitigating even their > own risks! Think about it... > > > -- > Regards > > Signer: Eddy Nigg, StartCom Ltd. > Jabber: [EMAIL PROTECTED] > Blog: https://blog.startcom.org > _______________________________________________ > dev-tech-crypto mailing list > dev-tech-crypto@lists.mozilla.org > https://lists.mozilla.org/listinfo/dev-tech-crypto > _______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto