On 2011-02-05 2:02 PM, Nelson B Bolyard wrote:
On 2011-02-05 13:28 PDT, Zack Weinberg wrote:
>> ...
There is a list/newsgroup focused specifically on the browser policy
governing the admittance of CAs to mozilla's root CA list.  That probably
seems like the more obvious place, but it's where all the CA
representatives hang out, and some fear that any proposal that appears to
be intended to displace PKI will not get a fair hearing in that venue.
But feel free to brave mozilla.dev.security.policy if you wish.

Since the conversation has started here, let's keep it here for now.

I have been trying to stay out of any PKI versus DANE arguments, and
(as you may see from the proposal) I still see a role for "traditional"
CAs in providing additional validation beyond "the server for this DNS
name should be using this public key".

I think CAs still get most of their revenues from DV, and so perceive DANE
as a direct threat.

Quite possible.

However, I wouldn't especially miss the current state of affairs with
DV certification if DANE totally supplanted it.

Sadly, I'm sure you're not alone.

In this hypothetical, what would you consider to have been lost? (This is not a rhetorical question, and in fact I have a concrete answer to it myself, but I'd like to hear yours first.)

"bogus" in this case is a term-of-art defined by RFC 4033.
[...]
Yes, thanks for that info.  I obviously wasn't aware of that definition.
Would a parenthetical reference to it in that sentence be redundant?

No, that's a good idea, I'll add one.

All the browsers live in mortal fear of losing market share.  Anything
that causes users to TRY another browser is to be avoided at ALL COST.
Historically, unbypassable security errors have been among the leading
causes.  The only way to get browsers to do it is to get ALL browsers
to do it at the same time.  I believe that is not possible.  Many failed
attempts by lots of people to make that happen back by belief.

Allow me my optimism for the moment, please. It certainly *was* the case in the past that "anything that causes users to try another browser is to be avoided at all cost" but I think that is no longer true, and the STS experience says that browsers *can* manage un-bypassable security errors with opt-in from the site (which DANE can be considered as).

Note that if we can't get this language (or any of the rest of it) into the IETF's spec, my fallback plan is to put it forward as browser consensus behavior for HTTPS, working through the W3C, the CABforum, or WHATWG; so I don't think getting all browsers to do something at the same time is impossible in this case.

If you're not on this list, please join it.  Customarily, replies go only
to the list with no CC's to others.

I am reading it via the newsgroup.

zw

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to