On 02/12/2011 12:32 AM, From Stephen Schultze:
Who the subscriber is (not higher level validation, sanity check)


I still can't decipher this.

I didn't expected that you do :-)

what the requested host name is

There is no ambiguity in DANE.

Indeed, PAYPA1.COM, MICR0S0FT.COM, PAYPAL.DOM.COM, BANK0FAMERICA.COM....all goes.

what's the purpose of a certificate

There is no ambiguity in DANE

Of course not, that's why we have this: http://www.antiphishing.org/reports/APWG_GlobalPhishingSurvey_2H2009.pdf


cryptographic weaknesses

Better done in the client.

Not done or insufficient implemented mostly due to backward compatibility and other considerations.

A review of the requested properties in a certificate are an obvious
benefit, it's not unnecessary with keys-in DNS, it's not possible.

The only relevant properties are domain and key. The domain is implicit and the key needs no review other than basic sanity checks done in the client.

That's your opinion, I don't share it. Networks that repeatably are used for those unfavorable purposes are happily served by the client, but CAs don't necessarily issue certificates to them.

I readily concede that some CAs have revoked DV certs for sites that were doing things that most people would consider "bad", and perhaps that revocation actually prevented them from doing more "bad" things (although I suspect that the vast majority of phishing/malware/etc doesn't rely on HTTPS whatsoever).

True - did you wonder why? Did you hear about the complaints at Mozilla about one such site that had a certificate from a CA?

I do know that millions of domains accused of such behavior have been removed by just one NIC. Which is more "effective"?

How come that there were millions in first place? The most used TLDs are however .BE, .COM, .EU, .NET, .EU, and .UK. and not .CN according to the APWG.

But all of the above has to do with your claims about what disadvantages DANE has relative to CA DV. You persistently ignore the clear disadvantages of CA DV relative to DANE, such as exclusivity, delegation, smaller surface area of vulnerabilities, etc.

That's because I don't believe it's a solution in itself, it can become part and increase security clearly for all CA issues certificates (including DV). Having this advantage in addition to the existing trust model (one that is increasingly improving as well) is an excellent goal.

CAs stand to benefit greatly by leveraging DANE to add these characteristics to their more highly validated certs. They should be cheerleading such efforts (and several are).

They might have a particular agenda I don't share. Obviously I'll go for something I believe in which is not what you are proposing.

Your pattern of reasoning, on the other hand, is to assert that DV CAs simply "know best" -- therefore we should continue to let them insert themselves into a process that could be run far more securely and efficiently without a third party.

I believe that CAs provide exactly the value necessary to make a difference which you think is superfluous.

  I don't buy it.

Fine with me. Was nice discussing (again).

--
Regards

Signer:  Eddy Nigg, StartCom Ltd.
XMPP:    start...@startcom.org
Blog:    http://blog.startcom.org/
Twitter: http://twitter.com/eddy_nigg

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to