Anders Rundgren wrote:
http://www.mozilla.org/projects/security/certs/policy

From what I have seen on this list there has been a lot of talk about
inclusion of various CA root certificates in the Mozilla distributions.

IMO, most of these CAs are insignificant except for SSL certs.

Well, to some extent one could argue that the same applies for SSL certs. The original purpose of SSL certs was to encrypt credit cards, and while a fair bit of that goes on, the new use of *importance* is one where the authentication requirements are king: online payments (and banking, stock, etc). That is, phishing being a failure of authentication, not encryption, indicates that anything that might improve authentication might help phishing.

Now, it could be argued that if there is a real need to provide real protection, then EV might be the direction. It is only O(10000) sites. If this is indeed an argument that is accepted, it suggests a lowered bar for all the rest.

As I understand it, this is Mozilla's current posture, albeit unwritten.

Why?  Because the vast majority of organizations (in the rare situation that
they use client-side PKI), actually issue their own client-certificates.
BTW, I don't see that other providers of security software are particularly
anxious extending their preconfigured trust lists.

Right, this is a challenge to the concept that all CAs are the same. Clearly they are not, but can they be made the same? Your argument would be that they are not in a client-side, geographical context. The EV argument would be that they are not, in a server-side authentication context.

Some of the CAs like the recently discussed Hungarian CA also seem to
be a of local interest in the same way as the 16(!) qualified certificate
CAs operating in Italy.

Yes. Qualified CAs do not represent a difficulty for Mozo, IMHO, as they are well regulated already (although recent discussions indicate there are clashes between PKIX and qualified approaches at the technical level).

Anyway, if the goal is establishing a user/client-level CA trust list, Mozilla
is not even close and that IMO makes the whole idea somewhat less
powerful.


What Mozilla's goals are in security is obviously a hot topic :)


It doesn't matter if it is wrong, stupid, or unsecure, but for consumer
authentication local / private PKIs rule, and I don't see that changing
due to things like business models, liability concerns, and cultural
differences.

Business models: well, the best we can do here is to surface the different interests. The problem I see here is that in security, nobody speaks for the user. It is mostly corporations, speaking as if.

Liability: this is a huge issue that all should look towards. CAs set liability to zero, approximately, in general. Mozilla should do the same. Once this is done, it removes a false barrier that we keep tripping over; and we can better add value once it is gone.

Cultural: I agree it is a barrier. The Europeans and North Americans don't see eye-to-eye in PKI nor security. I have no easy answer to that one.

All of which supports your claim that, for consumers / individuals, local / private PKIs rule.

I do not intend to respond to this posting because I understand that
this is a sacred cow, and I do eat meat :-)


As I've written at length elsewhere, the goals in security are not aligned well with other goals in open source, open internet and peer-to-peer communications.



iang

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to