On 03/25/2009 12:35 AM, Kyle Hamilton:
'reasonable security'
'this service' (the one you offer 'for free') -- my own assumption is
that you don't offer the service of verifying community membership for
web-based communities that don't offer email accounts.

Nope, and it's beyond the scope of what we do generally. So it doesn't rule out communities...

'how these providers operate': I'd point you to the "internet PKI
rethought" document that I had up, but I've since cancelled my .Mac
account -- but the basic idea is that if someone uses a community,
they already trust (and have to trust) the administration of the
community to properly arbitrate the identities within that community
-- and only within that community.

I don't understand how this is connected to the initial idea of finding some better ways to use client certificates for mail (was actually client certificate authentication IIRC). I think I lost you here...

and my definition of "community", as far as I have always used it: Any
group of people who use a common service, within which service
individuals can be uniquely referenced.  Services like
'fanfiction.net'.  Services like 'slashdot.org'.  Services like
'everything2.com'.  Services like MUDs.  Services like Second Life.
All of these are communities which, because they do not deal with
"real-world identities" in any way that you can define or reference in
your certification policies (they don't use real-world names, and they
don't offer email addresses), are unable to use the services that you
(and other CAs) offer "for free".

OK, so how are they relevant to this idea?

These services are the masters of their own domains -- they are the
absolute arbiters of identity within themselves.  This means that they
are Authorities.  Your argument removes their ability to Certify those
identities for use between people inside those spheres.  (Think of
them like company-internal root CAs, only instead of having a legal
construct of a company or corporation, it's a loose social construct
of association.)

I have no problem with any of them as long as their usage and trust remains limited with their domain and internal activities.

This is why I wanted to be able to change the chrome to say "hey,
Mozilla hasn't vetted this CA, we recommend you don't put in your
credit card number or any private details".

No, I don't want that. But that's for web sites anyway, not connected to mail I think...

...as such, Mozilla goes a step fuhrer and tells you correctly "hey, we can't know if you are connecting to the site you intend to connect to and we recommend not to connect to the site...it might be somebody different really".

This is why I want to be
able to use those certificates as, for example, iChat/AIM encryption
certificates.

What does prevent you from doing that? With and without CA issued certificates?

This is why I want to expand the OTR IM-encryption
protocol to use certificates as a means of authenticating the remote
party, without disturbing its other aspects.

Also here, I don't think that anything prevents you from doing so. But that's not the scope of the idea I found interesting.

Thawte's the ONLY provider I know of that even considered adding
community membership information to its certificates, but it never
considered removing the real-world identity information that it had
obtained -- basically, it wanted to bind additional identities to the
real-world identity.  As a privacy advocate, I do have a problem with
this approach.

It's hard to serve two masters...either it's disclosed or anonymous. It could be even something like "we have validated those details, but ask him if he wants to show those details to you"...

--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: start...@startcom.org
Blog:   https://blog.startcom.org

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to