Re: Creating a Global User-level CA/Trust Infrastructure for SecureMessaging

2008-12-05 Thread Anders Rundgren
>Now, if the discussion can be steered to how Mozilla's crypto can succeed at >becoming as popular as Skype may be, WITHOUT it having to resort to >- closed source, >- proprietary designs (restricted intellectual property), >- being a closed system with no interoperability, >that may be worthwhile

SECOM Trust EV root inclusion request

2008-12-05 Thread Frank Hecker
Per the CA schedule (for which I need to update dates), the next CA on the list for public comment is SECOM Trust, which has applied to add a new root CA certificate to the Mozilla root store and enable it for EV, as documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?

Re: Creating a Global User-level CA/Trust Infrastructure for Secure Messaging

2008-12-05 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2008-12-05 04:48: > On 12/05/2008 09:17 AM, Nelson Bolyard: >> Ian, >> >> Now, in contrast to that, I have been led to believe that Skype's: >> - protocols, security designs and parameters are proprietary, secret, have >> not been openly published, and thus not subjected to publ

Re: Creating a Global User-level CA/TrustInfrastructureforSecureMessaging

2008-12-05 Thread Michael Ströder
Anders Rundgren wrote: When any of you guys have made a *public* write-up on how you would address the [related] issues mentioned on p.2 in this document http://webpki.org/papers/web/A.R.AppliedPKI-Lesson-1.pdf you are ready for the real discussion. That's easy since there's not need for end-2-

Anders' p2 challenge

2008-12-05 Thread Ian G
Anders wrote: > When any of you guys have made a *public* write-up on how you > would address the [related] issues mentioned on p.2 in this document > http://webpki.org/papers/web/A.R.AppliedPKI-Lesson-1.pdf > you are ready for the real discussion. 1. How is the purchaser (P) going to select an

Re: Creating a Global User-level CA/TrustInfrastructureforSecureMessaging

2008-12-05 Thread Anders Rundgren
Michael Ströder wrote: >> Secure e-mail must be destroyed, or to be more correct; >> replaced by something that actually works for ordinary people. >Oh, come on! You simply want to sell something new. That's not something >I can take serious. I'm not selling anything except maybe a vision of a m

Re: Creating a Global User-level CA/Trust InfrastructureforSecureMessaging

2008-12-05 Thread Michael Ströder
Anders Rundgren wrote: Michael Stroder wrote: I'm often working while traveling by train. I'm off-line then. I want the encrypted e-mail ready to be in the [Outgoing] folder - protected right from the beginning. This does not appear to be a general requirement. Presumably most people have ot

Re: Creating a Global User-level CA/Trust InfrastructureforSecureMessaging

2008-12-05 Thread Eddy Nigg
On 12/05/2008 10:54 PM, Anders Rundgren: This is why IM kills S/MIME because the latter does not require awkward saving of keys in eternity. Anders, the issue is the way a program decides to store a message. IM is instantly, but if your IM history is stored in an encrypted form by the very

Re: Creating a Global User-level CA/Trust InfrastructureforSecureMessaging

2008-12-05 Thread Anders Rundgren
Michael Stroder wrote: >I'm often working while traveling by train. I'm off-line then. I want >the encrypted e-mail ready to be in the [Outgoing] folder - protected >right from the beginning. This does not appear to be a general requirement. Presumably most people have other documents that woul

Re: Creating a Global User-level CA/Trust Infrastructure forSecureMessaging

2008-12-05 Thread Michael Ströder
Anders Rundgren wrote: Michael Ströder wrote: That there should be as you claim mainly a "UI problem" is an opinion that has some support in the literature ("Jonny can't encrypt"), but I feel that it is much deeper than that; security should probably as in the case of Skype be transparent, not n

Re: NSS and PKCS#11 versions of modules

2008-12-05 Thread Martin Paljak
Thanks for tips! Could you point me to the line in spec where it says that slots can only be added. I cant find the place where it forbids removing. On 12/5/08, Robert Relyea <[EMAIL PROTECTED]> wrote: > Martin Paljak wrote: >> Thanks! >> >> I was only trying to figure out if there is any differe

Re: NSS and PKCS#11 versions of modules

2008-12-05 Thread Robert Relyea
Martin Paljak wrote: Thanks! I was only trying to figure out if there is any difference in 2.11 vs 2.20 handling. 2.20 allows slots to be added during the lifetime of a cryptoki application. Can you also explain how NSS handles the feature or any gotchas in implementing support for hotplugg

Re: Creating a Global User-level CA/Trust Infrastructure forSecureMessaging

2008-12-05 Thread Anders Rundgren
Michael Ströder wrote: >> That there should be as you claim mainly a "UI problem" is an opinion >> that has some support in the literature ("Jonny can't encrypt"), >> but I feel that it is much deeper than that; security should probably >> as in the case of Skype be transparent, not needing any UI

Re: Creating a Global User-level CA/Trust Infrastructurefor SecureMessaging

2008-12-05 Thread Michael Ströder
Anders Rundgren wrote: This is almost like a discussion about "theory" versus "practice". I agree here. ;-) As a researcher in this field, I'd hoped that the gap would diminish over time but it seems that is actually widening! Well, it turned out that some researchers do not have personal p

Re: NSS and PKCS#11 versions of modules

2008-12-05 Thread Martin Paljak
Thanks! I was only trying to figure out if there is any difference in 2.11 vs 2.20 handling. 2.20 allows slots to be added during the lifetime of a cryptoki application. Can you also explain how NSS handles the feature or any gotchas in implementing support for hotpluggable PC/SC readers?

Re: Creating a Global User-level CA/Trust Infrastructure for SecureMessaging

2008-12-05 Thread Michael Ströder
Anders Rundgren wrote: That there should be as you claim mainly a "UI problem" is an opinion that has some support in the literature ("Jonny can't encrypt"), but I feel that it is much deeper than that; security should probably as in the case of Skype be transparent, not needing any UI at all. I

Re: Mozilla CA Certificate Policy - Useful?

2008-12-05 Thread Michael Ströder
Anders Rundgren wrote: Ian G wrote: Michael Ströder wrote: If the private key is no longer available, yes, encrypted data technically cannot be decrypted anymore. Note the decision here to store the email in private-key encrypted form, instead of (for example) cleartext or re-encrypting it w

Re: Mozilla CA Certificate Policy - Useful?

2008-12-05 Thread Nelson B Bolyard
Ian G wrote, On 2008-12-04 22:58: > (I discovered some other oddities about S/MIME recently: revocation > seems to be incongruent with key distribution. I can distribute a new > cert only in an S/MIME signed email, but I can't distro any updates to > my key situation. When I lose a key, all

Re: Mozilla CA Certificate Policy - Useful?

2008-12-05 Thread Michael Ströder
Ian G wrote: Michael Ströder wrote: Eddy Nigg wrote: On 12/05/2008 08:58 AM, Ian G: > When I lose a key, all the old encrypted email is no longer readable ... which presumably happens when revocation happens as well. For your protection, yes. ??? If the private key is no longer availabl

Re: NSS and PKCS#11 versions of modules

2008-12-05 Thread Nelson B Bolyard
Martin Paljak wrote, On 2008-12-05 07:03: > Hi! > > PKCS#11 modules advertise its versions in two different places: in the > structure returned by C_GetFunctionList and in C_GetInfo. What happens > if those versions mismatch or which one has higher priority? Answering only for NSS, NSS igno

Re: Mozilla CA Certificate Policy - Useful?

2008-12-05 Thread Anders Rundgren
Ian G wrote: >Michael Ströder wrote: >> If the private key is no longer available, yes, encrypted data >> technically cannot be decrypted anymore. >Note the decision here to store the email in private-key encrypted form, >instead of (for example) cleartext or re-encrypting it with the master >pass

Re: Mozilla CA Certificate Policy - Useful?

2008-12-05 Thread Ian G
Michael Ströder wrote: Eddy Nigg wrote: On 12/05/2008 08:58 AM, Ian G: > When I lose a key, all the old encrypted email is no longer readable ... which presumably happens when revocation happens as well. For your protection, yes. ??? If the private key is no longer available, yes, encryp

Re: Mozilla CA Certificate Policy - Useful?

2008-12-05 Thread Nelson B Bolyard
Kyle Hamilton wrote, On 2008-12-04 10:57: > On Sat, Nov 29, 2008 at 3:57 PM, Frank Hecker > <[EMAIL PROTECTED]> wrote: >> The primary reason CAs apply to have certificates included into NSS, and the >> primary reason we have a policy about this, is because CAs want their >> customers' SSL certific

Re: Mozilla CA Certificate Policy - Useful?

2008-12-05 Thread Michael Ströder
Eddy Nigg wrote: On 12/05/2008 08:58 AM, Ian G: > When I lose a key, all the old encrypted email is no longer readable ... which presumably happens when revocation happens as well. For your protection, yes. ??? If the private key is no longer available, yes, encrypted data technically ca

Re: Mozilla CA Certificate Policy - Useful?

2008-12-05 Thread David E. Ross
On 12/5/2008 4:08 AM, Eddy Nigg wrote [in part]: > On 12/05/2008 08:58 AM, Ian G [also in part]: > > > When I lose a key, all the old encrypted email is no >> longer readable ... which presumably happens when revocation happens as >> well. > > For your protection, yes. That's contrary to the wa

NSS and PKCS#11 versions of modules

2008-12-05 Thread Martin Paljak
Hi! PKCS#11 modules advertise its versions in two different places: in the structure returned by C_GetFunctionList and in C_GetInfo. What happens if those versions mismatch or which one has higher priority? Does the version number change the way NSS (or Firefox in that matter) behaves? --

Re: Creating a Global User-level CA/Trust Infrastructure forSecureMessaging

2008-12-05 Thread Eddy Nigg
On 12/05/2008 12:56 PM, Eddy Nigg: In this respect, Globalsign might implement it exactly in the same way. We might however ask them or read their CPS instead. I had another look at http://www.globalsign.com/support/csr/autocsr.html and apparently they aren't sending the PKCS12 file by email

Re: Creating a Global User-level CA/Trust Infrastructure for SecureMessaging

2008-12-05 Thread Eddy Nigg
On 12/05/2008 03:20 PM, Anders Rundgren: I doubt that Ian promotes the things you claim he does. The tone and arguments highly suggests exactly that. That there should be as you claim mainly a "UI problem" is an opinion that has some support in the literature ("Jonny can't encrypt"), but I

Re: Creating a Global User-level CA/Trust Infrastructure for SecureMessaging

2008-12-05 Thread Anders Rundgren
Eddy Nigg wrote: >Nelson wrote: >> Now, in contrast to that, I have been led to believe that Skype's: >> - protocols, security designs and parameters are proprietary, secret, have >> not been openly published, and thus not subjected to public scrutiny >> - components are all proprietary. Their cli

Re: Creating a Global User-level CA/Trust Infrastructurefor SecureMessaging

2008-12-05 Thread Eddy Nigg
On 12/05/2008 01:03 PM, Anders Rundgren: And it goes on and on http://news.cnet.com/8301-17939_109-10110382-2.html while security communities are talking about perfect solutions for a minority of security-conscious users... This is almost like a discussion about "theory" versus "practice". As a

Re: Creating a Global User-level CA/Trust Infrastructure for Secure Messaging

2008-12-05 Thread Eddy Nigg
On 12/05/2008 09:17 AM, Nelson Bolyard: Ian, Now, in contrast to that, I have been led to believe that Skype's: - protocols, security designs and parameters are proprietary, secret, have not been openly published, and thus not subjected to public scrutiny - components are all proprietary. Their

Re: Mozilla CA Certificate Policy - Useful?

2008-12-05 Thread Eddy Nigg
On 12/05/2008 08:58 AM, Ian G: > When I lose a key, all the old encrypted email is no longer readable ... which presumably happens when revocation happens as well. For your protection, yes. I don't know if there is even anyone working on Tbird security; Yes thing about this was that Moz

Re: Creating a Global User-level CA/Trust Infrastructure forSecureMessaging

2008-12-05 Thread Eddy Nigg
On 12/04/2008 02:49 PM, Ian G: Telephony was provided to the masses and it's inherently insecure. Skype provided VoIP to the masses. And it was secure. You keep claiming it and I tell you that it's not. Of course we can continue forever here. But it doesn't come close to the same security

Re: Creating a Global User-level CA/Trust Infrastructurefor SecureMessaging

2008-12-05 Thread Anders Rundgren
And it goes on and on http://news.cnet.com/8301-17939_109-10110382-2.html while security communities are talking about perfect solutions for a minority of security-conscious users... This is almost like a discussion about "theory" versus "practice". As a researcher in this field, I'd hoped that t

Re: Creating a Global User-level CA/Trust Infrastructure forSecureMessaging

2008-12-05 Thread Eddy Nigg
On 12/05/2008 11:38 AM, Rob Stradling: It's considered a very bad practice I think. Eddy, could you expand on this point? I don't think WebTrust prohibits CAs from generating/retaining private keys for users. Retaining the private keys of users requires a key escrow service, reasonable prot

Re: Creating a Global User-level CA/Trust Infrastructure forSecureMessaging

2008-12-05 Thread Rob Stradling
On Wednesday 03 December 2008 12:22:19 Eddy Nigg wrote: > On 12/02/2008 08:16 PM, Ian G: > > Right, CAs won't have the private keys, unless they do. I imagine a > > corporate CA can do what it likes, and doesn't need the consent of the > > user. > > Sure, but they aren't in my list of CA roots. > >

Re: Creating a Global User-level CA/Trust Infrastructure for SecureMessaging

2008-12-05 Thread Ian G
Anders Rundgren wrote: This is BTW not too different to PayPal which I guess works so well because it owns the entire customer-base and doesn't have to mess with other competing/collaborating partners. Ahhh... Paypal :) Now there is a poignant example. Paypal is awful. Its security is woefu

Re: Creating a Global User-level CA/Trust Infrastructure for Secure Messaging

2008-12-05 Thread Ian G
Nelson Bolyard wrote: Ian, Previously in this thread, you wrote: For me, the purpose of this debate is finding out what users can expect from Mozilla by way of security. Thank you for taking the time to lay out your views! The answers to that quest probably include these properties: - op

Re: Creating a Global User-level CA/Trust Infrastructure for SecureMessaging

2008-12-05 Thread Anders Rundgren
Nelson wrote: >> For me, the purpose of this debate is finding out what users can expect from >> Mozilla by way of security. >The answers to that quest probably include these properties: >- open, openly specified, not secret, >- inner workings subjected to public scrutiny. >- security claims indep