The following is related to the S/MIME discussions.

One of the many [unsolvable] problems with S/MIME is the establishment of a 
globally working user-level PKI infrastructure.

Although not perfect, I think it is fair to say that a globally working 
domain-name-level PKI infrastructure actually already exists.

If we (security experts) want to create anything that could match closed 
networks such as Skype, having 100M+ users enjoying full end-2-end-security, I 
think we need to be a bit pragmatic and not hoping that users should be 
extremely interested in certificates, or that the UN should provide us with a 
universal root certificate.

The following proposal breaks RFC 3280 validation rules which is bad but the 
idea is to only use this scheme in a special purpose messaging protocol, not 
"infecting" NSS in any way.  Here it goes (please don't throw up, this is 
completely serious)...

Each domain (host) have a "pseudo-CA" using a commercial-grade SSL certificate 
as a CA certificate.  Certificates created by such a CA should have a specific 
DN format (in order to be valid), where the host-name of course must be a core 
component (you can only certify things in your own domain).

Based on such a trust infrastructure, an on-line-based secure messaging system 
should be able to achieve Skype-level scalability while still being fully 
distributed.  I haven't really gotten down to the nitty-gritty with the 
messaging itself, because a system like this obviously requires a bunch of 
other hot-shots as well :-)

Enrolment issues?  Skype does this without the user having to know what a 
certificate is.

Applications include all kinds of interactive communication with mobile phones 
as a really interesting target unless it gets outlawed.

Anders Rundgren
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to