On 25/1/09 22:06, Florian Weimer wrote:
* Ian G.:
What I know of, not exclusive or reliable:
...
2. while certificates by their nature and name are often public
("public key"), that doesn't mean that anyone else can use
them. Indeed, some CAs go to the extent of making their certificates
"proprietary" under the doctrine of copyright, etc. CAcert does this,
and also AFAIK, Verisign does this although for perhaps different
motives. In this case, the direct concern appears to be to establish
the RPA or equivalent.
This also affects the certificates in the browser list, right?
Yes. So technically if someone comes up with a new "use model" for
certificates, they might be infringing on copyright. For example,
statistics collection might fall under that (and did in one case that
was observed / documented).
What bugs me about the lack of certificate disclosure is that it
typicall covers less data which ICANN requires from registries and
accredited registrars to make available (at a few in some cases). DNS
provides quite a bit of transparency in this area (data accuracy
issues notwithstanding). The browser PKI is supposed to cover
matching data and to be more secure, yet very little data is published
(or made available for a fee) in searchable form by the certification
authorities themselves.
Well. Publication is not the same thing as security. Although there
are some communities where "open" is promoted as the source of all
bounty, some things want to be private to be secure.
Certificates kind of walk the line between privacy and publication,
trying to have their cake and eat it too. They publish (by means of the
so-called public key) some verified data about the person like the real
name, but they also promise security. Which clashes with privacy,
because you should be able to do net stuff while being private. Nudity
isn't security, neither in names nor other forms of commerce.
The old x.509 invention came from telcos, who thought in terms of
telephone books. In the old days, everyone had an entry in the
telephone book, and the privacy derived from the fact that it was hard
to find any particular J. Smith. Sort of. They charged you for
privacy, or an "unlisted number", and this was good. They thought.
They covered other problems with laws and an iron grip on the copper.
Yet, when x.509 actually hit the internet world in the early 1990s, a
lot of privacy conscious organisations (e.g., banks) looked at this and
realised it was a non-starter (here, read any rant by Lynn Wheeler with
the word "bloat" in it).
But by then it was too late; the code was in the infrastructure, PKI
had won the war of models. So the privacy and other communities like
banks rejected it. We still see this clash of concepts in the
"anonymous v. fully named" contrast within PKI.
Which brings us full circle to the question about security. As long as
the CA knows who you are, and can do something about it, why do we need
publication?
Well, the answer to that is that the business model of the CAs is
fundamentally limited by the need to sell "verifications of names,"
while avoiding any liability (see below). It is harder to achieve this
balance while the name is anonymous, because the CA then has to
specifically take on the liability (as it is the one hiding the name).
I don't think this makes any sense whatsoever
--until you cynically assume that the opacity is there to protect CAs
from PR blunders and worse. 8-(
Well, many words could be said about that, but let me put forward my
standard rant:
CAs have protected themselves [1]. Successfully, whether you like it or
not.
The task of Mozilla and points further south [2] is to figure out what
to do, given that situation [3].
My advice is this: Mozilla sets liability to zero, and does so loudly.
That is, it recognises reality, and moves to align systems, documents
and processes with reality.
The reason this works is because once we recognise reality, and put
Mozilla on a liability footing that is approximately close to that
reality, then everyone can stop dancing around the thing that nobody
dare say.
Once we stop dancing around the impossible, and stop telling fairy
stories to each other and to the end-users ... then and only then will
real solutions and real improvements be encouraged to emerge [4] for the
benefit of end-users.
iang
[1] I have skimmed the RPAs of most popular CAs at one time or another,
and presented the language on this group. Most have the key language in
it. So my view covers the market in general. Although some specific
CAs may not have subscribed to this theory, or incompletely implemented
it. Also, this is "views of legal positions" so the normal caveat of
"consult your own lawyer" applies.
[2] End-users, other relying parties, other vendors, standards
committees, governments, developer communities and others that might
have something to do with certificates.
[3] There is a strong implication here that you, and everyone else, has
zero chance of changing the situation.
[4] They are already emerging; but they will emerge faster when we can
deal with reality, not dancing.
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto