On 23/1/09 21:56, Florian Weimer wrote:
* Michael Ströder:

Florian Weimer wrote:
What about requiring that all certificates must be published by the CA
(including sub-CAs)?
No, this might lead to also revealing internal DNS names never meant to
be public.

Huh?  Typical CA policies explicitly state that subscriber
certificates are not confidential, and are not treated as such by the
CA (so that they can be used by marketing, for instance).


What I know of, not exclusive or reliable:

1. privacy, as Eddy has pointed out. The reason that certificate info is treated as "non-confidential" is fundamentally a statement that reduces the liability for the CA in the event of a breach. As far as I understand it, that is. Losing data that is non-confidential is a lower class of sin than losing daya that is confidential, so it is good for the CA to state it as policy.

2. while certificates by their nature and name are often public ("public key"), that doesn't mean that anyone else can use them. Indeed, some CAs go to the extent of making their certificates "proprietary" under the doctrine of copyright, etc. CAcert does this, and also AFAIK, Verisign does this although for perhaps different motives. In this case, the direct concern appears to be to establish the RPA or equivalent.

3. The publication of certs in a public archive is not to be confused with the storage in a private archive. Beyond the obvious reasons, they can also be used to invalidate a forged cert. This would have been seen perhaps if the recent CCC intermediate MD5 subroot had appeared in court, in that one can always see circumstances where an external agency can forge a cert, but that agency cannot ("so easily") insert the cert into the some valid chain of created certs within the issuer. The evidence tells the story that it is forged (but not how it was forged .... what the court makes of that story and how the contracts deal with it are ... up for wider speculation of course.)

4. To comment on Kyle's earlier comment that Audits may impact the question of publication of certs and/or their recording in a repostory:

  * DRC asks for publication
  * WebTrust does not, as far as I can read it
  * Chokhani et al says that section 2 of the CPS should document it
  * evidence rules don't matter if you don't present it as evidence;
    if you do present it as evidence, it is too late to change the
    history, you got what you got.  Which is to say, this is not a
    general requirement, but might be added value, "and you can use
    this in court as evidence."
  * general state rules on recording documents might apply, but I am
    not convinced myself.

5. Finally, see comments earlier about the substantial number of internal certs. There is some sort of validity in corporations using certs in internal networks not wanting them broadcast.




iang
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to