On 02/11/2011 01:33 AM, From Stephen Schultze:
You cut off the end of the sentence, which made clear that I was referring to how the *trust* of the CA model relies on blind trust of the data in DNS. Any fundamental trust model shortcoming of DNS is likewise a shortcoming of CA DV. You've never explained how you think this could be false.

I tried - let me try again. But actually I should start with your last question in this post first and it would make a lot more sense (you can scroll down if you want)...

There are additional steps CAs can/should/do besides checking domain control - even in the DV settings. Those range from basic sanity checks, checks on weak/small keys, weak hashes, domains with obvious problems, re-validation and other flagging mechanisms before issuance, phishing detection and so forth.

It continues with the ability to revoke certificates upon detection/reporting of misuse or other issues - it's a very strong point why a CA is beneficial.

Additionally, DV may protect against a shortcoming of DNS that is happening now and possible wrongful issuance of a DV certificate may be detected due to shortcoming of DNS. Those are just the very obvious points I mentioned before. Keys-in-DNSSEC can't provide that without the involvement of a third party like a CA.

FWIW, it should be obvious that the EV trust model does *not* rely on blind trust of DNS because it incorporates OOB confirmation of identity rather than just domain ownership. This is a good thing.

Well, even WHOIS needs DNS - obviously the better the organization validation, the lesser the chance of misuse.

The only thing that Mozilla requires of DV CA's is that they validate domain ownership.

Well no, Mozilla requires a bunch of other things CAs must provide and do, including OCSP and CRLs, ability to report misuse, revocation requirements, sound PKI implementations (through WebTrust, ETSI), an audit regime, its own policies and reviews and and and...just look at the new policy requirements and how to apply. And this is just the beginning, more is to come from Mozilla and elsewhere.

Anti-phishing and other punishments for actions that the CA doesn't approve of are irrelevant

Why should they be irrelevant? They are certainly beneficial and very relevant indeed, otherwise why having them in first place. Subscriber obligations are not just here for fun.

I really don't understand why this has been such a problem, given that your work and reasoning on other topics is so good. It is a mystery to me.

Since this is NOT the policy list, I'm willing to share some thoughts...

I'm knowing both sides very closely. Those of the relying parties (including software vendors) and those of the CAs. I know the ins and outs of running a CA with everything it entails. If you haven't been there, you probably don't know enough yet.

But I'm also putting my money where my mouth is and I take some credit for changes that occurred and are occurring in this industry. Being it for providing an alternative (business model) to commonly known and conventional CAs and being it for guiding and demonstrating better and more responsible policies and practices and pushing for those to become applied evenly.

By doing that, I can assure you that DV is not just authenticated point-to-point encryption - even though DV is really the lowest level which should be used only for its intended purpose and stands just for that. But that's not all, there are things I don't want to publicly disclose and they are nowhere required. They still exists and contribute nevertheless.

Having said that, of course I'm not taking responsibility for every CA out there, but that's also the reason I'm working with Mozilla and elsewhere to improve existing practices and remove the problematic practices that do exist today, but are about to be addressed. I believe this will happen rather soon and within a useful time-frame. From there we can improve even further if possible.

Regarding DNSSEC - it will take years from now to get to an anywhere useful level. I've seen some attempts to replace conventional X.509 PKI trust come and go, this wouldn't be the first. However should software vendors ever rely on DNSSEC exclusively for TLS on the web (e.g. without third party issued certificates), I fear a disaster and SSL will become most likely entirely meaningless. Instead I believe that CAs should take the best out of DNSSEC for their validation procedures and this is my intention too. Time will tell if I'm right.

--
Regards

Signer:  Eddy Nigg, StartCom Ltd.
XMPP:    start...@startcom.org
Blog:    http://blog.startcom.org/
Twitter: http://twitter.com/eddy_nigg

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to