On 13/12/08 18:25, Frank Hecker wrote:
Ian G wrote:

A possible solution is an open end-user offer. I have before mentioned
that each CA should have a relying party agreement or similar;
something on offer to the mozo end-user. It should be the minimum, or
default, or entry-level document for the end-user. It should apply
even if the user never saw it, like an open source licence. It should
set liabilities between CA and end-user.

It sounds like you're referring to something like a PKI Disclosure
Statement idea that's been discussed in the past:

http://www.verisign.com/repository/pds.txt


Heading in the right direction, because that is a simple and readable document.

But the emphasis is different.  That document asks for a mini-CPS.

What I am thinking is more like the RPA ("relying party agreements"), already found on most CAs sites. This is not a PKI document but a legal document, and a business document. This is what the lawyer wants to see. The lawyers forced it on the CAs, not the PKI people.



Some CAs do indeed have these, but not all.

There are three reasons I would not propose it.

1. it seems to have a bug: everything is a SHALL which means if you don't like one section, you don't do the document, at all. This was probably unintended.)
2. it includes things that should not be there, as below.
3. it is emphasising PKI not legal relationships.

(actually they are all related, maybe the same bug.)

The reason for doing an RPA is that it draws a straight line from the end-user to the CA, for all the parties and stakeholders, and especially the lawyers. Right now, there is a connection, but no reliable map, and anyone can walk the path, but in many different ways. What we need is a route map. The RPA is that; an RPA lists the primary route.

Which explicitly removes the vendor from the primary route. Which addresses the issue of due diligence with unreadable CPSs.



iang



PS:  more explanatory notes:


The offer I have in my mind includes (roughly compared to that RFC's fields):

   Name, URL of the CA, whatever for a legal offer.
   The disclaimer on liabilities, warranties, indemnities, etc.
   Applicable law + forum of dispute resolution

Maybe no more than that? Again from the RFC, it would be optional to include:

   Certificate type:  likely all are covered
   Statement on Reliance, if so, how, etc.
   Information & status checking obligations

Including these things would depend heavily on ones views on PKI. And these things would be definately wrong:

   subscribers:  they have another agreement.
   Applicable agreements:  irrelevant, there is only this one.
   privacy policy: the end-user's privacy is not at issue
   Refund policy:  the end-user didn't pay a buck.

Especially, this last one:

   CA and repository licenses, trust marks, and audit

is exactly the thing that is not wanted in an RPA or end user offer. That's guaranteed to sent your legal cousel into paroxyms...

All the existing RPAs I have skimmed match this view. There is nothing novel about this; we just need to appreciate it and make it clear that this is the standard approach in the legal perspective of CAs.

https://www.verisign.com/repository/rpa.html

(I hate to pick on Verisign, but their RPA is the best one for explanatory purposes. It's clear, short, easy to read, and there are reasons to believe it is the state of the art in legal perspectives.)
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to