On 03/24/2009 10:21 PM, Kyle Hamilton:
Hate to say it, but anyone who scans for smime.p7s files on the net
can already do that.  The cat's already out of the bag.

What's that? You mean scan for email addresses at large, right? That's nothing new, but look, as a subscriber one has obligations and depending on the CA it requires a certain commitment. We haven't heard other CAs in regards to this idea, but there is more than just the email address and spam.

Additionally there are email addresses one might own which are nowhere published. I'm certain you are a privacy advocate, at least so much that it would bother you to have those emails in the hands of a party you don't like.

I'll reiterate what I said, with annotation: "You [the CA] must
verify/validate that a given private key [which matches the submitted
public key] can be used to decrypt something [which is encrypted with
that public key] sent to the email address claimed [in the initial
request]."  I think this sounds like an "email ping or similar
verification method."

OK, sounds interesting and I'm certain if this idea takes of we can figure out acceptable procedures.

I wouldn't like to promote the use of un-audited and perhaps insecure CAs,
sorry. Neither does it make sense to use them if the root doesn't exist -
and having the root imported via such a back-door of certificate
import/install utility isn't great either.
I'd like to point out that you're (once again) raising the barrier to
entry to the CA market, without providing any alternative for those
online communities.

There is perhaps situation where those aren't necessarily compatible with each other. We can certainly have discussion on this issue, preferable in a different thread since it wouldn't be helpful for this idea and distract. But of course we need to define the principals which guide us first and which would receive the most support by all parties involved (crucial IMO).

As such the Mozilla CA Policy is clear in this respect and this is what Mozilla decided long time ago. Additionally Mozilla is the most flexible software vendor in this regard I don't feel like Mozilla needs to compromise any further on this issue. Neither do I believe we should promote anything else. You can't have security and require from CAs to do the audit dance and then throw it out the backdoor as if it doesn't exist. Either this or that, but not both.

Remember, I'm also all about the process of making sure that only
people who explicitly trust a community trust what that community
does, and I'm also all about the process of ensuring that the people
who run the communities can do what they desire to do.  Also remember,
there is NO online community that suffers through an audit to be able
to open its doors.  There is NO online community that can guarantee
'security of accounts'.  Yet, people join them all the time, while
they don't bother joining CAs.  I wonder why this is?

That's only partly true...but I don't see the reason to support something we don't believe in. Which means, that there are enough CAs offering this service for free, we don't NEED alternatives. It would be perhaps a different argument if there weren't any CAs.

Now, if you believe in reasonable security which I'm sure is very important to you and most members here, we want to know about how those providers operate. In this particular space of cryptography and online security it's not a privilege, it's a must. Except if you prefer to forgo reasonable security at which point I'd rather not support it...

Also, it's not entirely clear where the "community" comes in here. Which community? Mozilla's?

For Class 1 certificates, there are very few details that would need
to be worked out.

This is up to the CAs to decide, I believe. Perhaps we could work out something which seems to be reasonable. And CAs would have to decide if this is acceptable to them or not.

For Class 2 and Class 3 certificates, there are more details that
would need to be worked out, but those are more related to
authentication of credentials before the request is moved to the CA's
processing queue.

I think this is beyond the scope of the current idea.

--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: start...@startcom.org
Blog:   https://blog.startcom.org

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to