> On Wed, Dec 17, 2008 at 11:14 AM, Frank Hecker
> <hec...@mozillafoundation.org> wrote:
>> Kyle Hamilton wrote:
>>> Actually, the 'threat model' is more related to versioning (via
>>> timestamp) than anything, and to ensure that no malware on my system
>>> (I try to keep it malware-free, obviously, but I also know that just
>>> because I don't think I've been hacked doesn't mean I haven't been)
>>> modifies a local copy I make.
>> Ah, OK. Well, if signing PDF documents doesn't interfere with viewing them
>> on non-Adobe software then I'm willing to have us consider doing it. Could
>> you or someone else send me a sample signed PDF document via email? Since
>> I'm running a Mac with VMware Fusion I can check it out on a variety of
>> platforms with different PDF readers.
On 12/18/2008 3:09 AM, Kyle Hamilton wrote:
> Eddy's gone ahead and sent a signed PDF, according to a later message
> in-thread.  I expect that it'll work without a hitch, though I would
> like to hear of any anomalous behavior. :)
>
> But, I'm struck again by a couple of questions.
>
> Why does everything have to have an explicit 'threat model' before
> cryptography can be applied?  In my view, cryptography is useful for
> MUCH more than just "protecting against potential attack".  (It's not
> like we're trying to protect secrets with national security
> implications.  It's not like we're trying to protect a financial
> instrument.  It's not even like we're trying to keep an affair
> secret.)
>
> As I've said before, I view cryptography as a means of associating a
> policy with data.  The policy in this case would be: this is a
> document version that someone working on behalf of Mozilla (currently
> -- and with the tenacity and thoroughness she's exhibited, hopefully
> for a LONG time -- Kathleen) prepared, it hasn't been corrupted, and
> it's got a timestamp so that later revisions can be identified as
> such.  Cryptography can give me a very good idea that these three
> concepts can be relied upon.
>
> It doesn't have to be a "legal document".  It doesn't need a
> contract-grade (i.e., Qualified Certificate in PKIX and EU parlance)
> signature on it.  All that I need to know is that what I'm reading is
> the actual working document with a means of determining if there's a
> newer one, and a digisig countersigned by a timestamp authority is a
> perfect means of accomplishing this.
>
> Why does it have to be any more complex than this?  Why does there
> have to be any more "meaning" assigned to the act of digitally signing
> something?  (Why do we always treat the concept of digital signatures
> as though we're signing away our firstborn?  What are we so afraid of?
>  That fear-among-the-experts is part of what makes cryptography so
> inaccessible to the common user, and reduces confidence in the system
> -- which leads to a lack of use, which leads to a dearth of innovation
> in application.)

Actually, a digital signature DOES NOT necessarily guard a document from
attack.  An attacker might still be able to delete a signed document.

A digital signature assures integrity, allowing the reader to determine
if the document has been altered.  An alteration might NOT be an attack;
it could instead be merely a dropped bit during transmission.

A digital signature also assures authenticity, allowing the reader to
verify that the document indeed originated with (or passed through the
possession of) the person who signed it.

I don't think either integrity or authenticity are an issue with
attachments to Bugzilla reports.  Those two issues are well handled by
the fact that Bugzilla operates under SSL.  Thus, signatures should not
be required for PDF documents.

-- 
David E. Ross
<http://www.rossde.com/>

Go to Mozdev at <http://www.mozdev.org/> for quick access to
extensions for Firefox, Thunderbird, SeaMonkey, and other
Mozilla-related applications.  You can access Mozdev much
more quickly than you can Mozilla Add-Ons.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to