CA liability has been focused on the RP since it an RP that "trusts" a CA
and its certificates, right?

A problem with this notion is that there is no end to what a wrongly certified
entity could cause in damages, particularly not for "eID" kind of certificates
that potentially opens any number of doors.  The obsession with signatures
has also been extremely contra productive;  authentication is 100 times more
important since it cannot be "rolled back", "repudiated" etc.

IMO it would be more reasonable to make CA liability an affair between
the subject subject (subscriber) than towards unknown RPs.  In some
way I understand why banks when acting as CAs essentially *never*
accept dealing with unknown RPs...

Regarding "accumulation" in the referred PKIX RFC, I mean the sum of
all transactions, break-ins etc. an incorrectly certified entity could perform.
At least from a CA liability point of view that's the most interesting part.

An identity certificate <<>> credit card because only the latter allows
comparatively simple damage control using account monitoring.

Anders

----- Original Message ----- 
From: "Ian G" <i...@iang.org>
To: "mozilla's crypto code discussion list" <dev-tech-crypto@lists.mozilla.org>
Sent: Thursday, December 18, 2008 17:00
Subject: Re: Publishing CA information documents in PDF format


On 18/12/08 13:20, Anders Rundgren wrote:
> Kyle,
> I fully agree with your conclusions.
> IMO a signature's primary function is to provide a mark of authenticity
> to something.  If the signature is associated with an unknown signer
> the value of the signature becomes rather limited.
>
> The Qualified Certificate concept is based on the strange idea that
> because the CA is liable to very high amounts of money, you can
> "trust" such signatures and thus do advanced business with total
> strangers.


This is based on the monetary view of reliability, in that it is only 
worth what you can get for it.  Standard finance principle.  If there is 
nothing, it is worth nothing;  if you can do harm X then it is worth X, 
potentially;  if you can get Y then it is worth Y, potentially.

(Case in point about a year ago, oh how soon we forget, is S&P, Moodys 
and the rating agencies.)

This I find to be quite a valid view, and it is widely used in the 
corporate and finance world, c.f., NPV, MTM, CAPM, where numbers are 
called for.  Although it certainly doesn't explain all of contracts & 
agreement behaviour.

Whether you can take that monetary number and relate that to "trust" is 
a whole other discussion...

And, we probably agree that the end result with Qualified certificates 
is likely to show the same as with non-QCs, in that the resultant value 
to relying party in objective monetary terms is zero.  (In other posts I 
have expressed the opinion that the expected liability is zero, which is 
another way of saying it.)


> What the designers of QC didn't think of is that anybody
> can get a QC without being checked to be a good payer, dependable
> vendor, etc.  If there is discomfort in a business relation, the CA has
> no means to rectify things making the value of the high liability very 
> limited.
>
> IF people started to believe that QC actually works as described we would
> soon be in a very bad position since a single disgruntled employee could
> send "fully authorized" POs all-over-the-map.


Yes.  But companies and people are generally smarter than that.  They 
know the monetary value is zero, and non-monetarised values are limited 
to the regulated needs, in general.


> PKIX took this to another extreme by publishing an informational standard
> for liability with is one of the most ridiculous things I have ever seen
> http://www.ietf.org/rfc/rfc4059.txt
> since it doesn't deal with accumulation!!!  The motive behind this RFC
> was "to increase the acceptance of certificates" :-)


Perhaps you could explain what you mean by accumulation?  I skimmed 
through that document, and had my own qualms.

Q:  does any CA actually use that extension?  Does any code display the 
extension?

I note that it "must be non-critical" which I find amusing :)

iang
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to