On Tue, Mar 24, 2009 at 12:56 PM, Eddy Nigg <eddy_n...@startcom.org> wrote:
>>
>> Remember this: A public key is an identity.  It is an identity which
>> is bound to the private key.
>
> Sure...
>
>> What would they know about you that couldn't be harvested from email
>> lists?  That you have a public key, and an email address that you use
>> that public key with?
>>
>
> So that I would receive even more up-sale spam that my private key isn't
> secure anymore from CAs I don't care? No thanks! Neither would I like to
> bother subscribers which didn't meant to receive and use a certificate from
> StartCom in first place. I think this is a bad idea.

Hate to say it, but anyone who scans for smime.p7s files on the net
can already do that.  The cat's already out of the bag.

Now, if you wanted to require a written contract signed by CAs that
Thunderbird would support this capability with by default, which
states that they will not spam, they will not allow anyone else to
spam on their behalf, and they will aggressively pursue any spammers
who violate that, I'm all for that.

>> I said "to request class-1 validation" -- you call it "verification",
>> but aside from the terminology I meant the same thing: you must
>> verify/validate that a given private key can be used to decrypt
>> something sent to the email address claimed.
>
> Re-read about Class 1 validation and Mozilla minimum requirement for email /
> client certificates. No CA is allowed to issue client certs for S/MIME
> without performing an email ping or similar verification method.

No CA *with a root included in NSS by default* is allowed to issue
client certificates for S/MIME without performing an email ping or
similar verification method.

I'll reiterate what I said, with annotation: "You [the CA] must
verify/validate that a given private key [which matches the submitted
public key] can be used to decrypt something [which is encrypted with
that public key] sent to the email address claimed [in the initial
request]."  I think this sounds like an "email ping or similar
verification method."

In fact, in this case, it's arguably more secure.  The client
requesting the certificate would be able to retrieve the
specially-formatted email from the server and automatically act on it,
thus minimizing the risk that it would be retrieved on another machine
that doesn't have the private key in its local database.

>> I would very much like to see this standardized.  I would prefer not
>> to limit it only to the NSS-included CAs, instead allowing a
>> specially-formatted link from any privately-run online community to
>> enable a request to be sent to that privately-run community's
>> certification system.
>
> I wouldn't like to promote the use of un-audited and perhaps insecure CAs,
> sorry. Neither does it make sense to use them if the root doesn't exist -
> and having the root imported via such a back-door of certificate
> import/install utility isn't great either.

I'd like to point out that you're (once again) raising the barrier to
entry to the CA market, without providing any alternative for those
online communities.  Instead, you're insisting on relying on email
addresses, which many community members don't want to make public
(probably at least partially in fear of spam).

Remember, I'm also all about the process of making sure that only
people who explicitly trust a community trust what that community
does, and I'm also all about the process of ensuring that the people
who run the communities can do what they desire to do.  Also remember,
there is NO online community that suffers through an audit to be able
to open its doors.  There is NO online community that can guarantee
'security of accounts'.  Yet, people join them all the time, while
they don't bother joining CAs.  I wonder why this is?

(Hint: it's the community.)

>> Honestly, you could do this with StartSSL's system as it stands right
>> now -- you verify email addresses for 30 days, and there's no reason
>> you couldn't simply accept a key submission and request to link it to
>> one of the verified email addresses, and issue the certificate on the
>> spot.  (In fact, you already practically do this, just with the manual
>> CSR pasting system or keygen tag.)
>>
>
> Yes, more or less this is correct, but I'm certain that the technical
> details could be worked out. Different CAs would have different requirements
> and we'd have to align and find a common ground between the ones which care
> to participate and contribute to the discussion and standard.

For Class 1 certificates, there are very few details that would need
to be worked out.

For Class 2 and Class 3 certificates, there are more details that
would need to be worked out, but those are more related to
authentication of credentials before the request is moved to the CA's
processing queue.  A challenge phrase or one-time-password could be
issued by the entity performing the validation.

(The US Patent and Trademark Office does it by sending a transaction
ID number via postal mail, and a verification code via email to the
address-of-record, only after a notarized jurat is physically mailed
in.  I honestly think the current batch of CAs are too paranoid in
this regard; if the USPTO is willing to do something so high-risk with
this system, I think that the rest of the world can fall in line.)

-Kyle H
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to