On Dec 27, 3:21 am, Nelson B Bolyard <nel...@bolyard.me> wrote:
> I think you're suggesting a cooperative agreement among CAs, whereby
> once a cert was issued for a domain name by one CA, other cooperating
> CAs would refuse to issue a cert for that same domain name.
> Is that what you're suggesting?

Yes, but only for certificates where the customer has actively
selected that we wanted to get listed in the database.

> 1) What problem would this proposed "central database" solve?  Would it
> exist merely to keep CAs from inadvertently soliciting the customers of
> their competitors?  What other purpose, if any, would it achieve?

The customer should be able to login an lock/unlock the certificate.
Just like the registrar lock with domain names. If everyone checked
trusted fraudlent certificates for high profile sites could be
avoided.

> 2) Would this lock a cert customer into a single vendor?  Would it
> prevent a party from enrolling for certs from several different CAs?
> As an acquirer of certificates, I would not want to be "locked in" to
> a single CA.

It should be up to the customer to decide. I think that e.g. Paypal
would love to have this security for their certificate.

> 3) If some CAs agree to such an approach, and others do not, is it still
> valuable?

This is also what Eddy pointed out. Everyone in the trusted group
would need to participate but browser vendors could insist on such
system and get it through I think.

> 4) I think this database effectively exists already, albeit in a
> distributed (not centralized) fashion.  If you want to know if the server
> at a certain DNS name already has a cert, and who issued it, and when it
> is due to expire, you can simply visit that server with an SSL client
> on any (or all) of the usual SSL ports (443, 465, 993), get the server's
> current cert, and get all that information from it.  I suspect you know
> this already.  :)

Yes, that is correct. I am not suggesting that all certificates get
locked but instead that the customer can opt in for a guaranteed lock.

> 5) There is an organization of cooperating CAs and browser makers,
> known as the CA-Browser Forum (CABForum.org), the people behind EV.
> They're probably the group to which proposals for CA cooperation
> should be directed.  They only admit CAs, and as Certstar is an RA,
> I'm not sure you could become a member.  But Comodo could represent you,
> or perhaps invite you to participate in the mailing list.  And you can
> always send email to the email address on their web site.

Sounds interesting. This was just an idea I got that I wanted to share
with your all. As I said it needs some work or may not be useful at
all :)

Happy new year !
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to