Sorry, I got Peter and Moxie mixed up there, Jet lag.

Sovereign keys and Convergence both suffered from the assumption that
you can change the internet by just throwing a project over the wall
and waiting for people to implement. The details are slightly
different though.

On Tue, Apr 15, 2014 at 8:23 PM, Phillip Hallam-Baker <hal...@gmail.com> wrote:
> On Tue, Apr 15, 2014 at 7:08 PM, Daniel Veditz <dved...@mozilla.com> wrote:
>> On 4/15/2014 7:43 AM, nobody wrote:
>>>
>>> I just wondered... what is the pull back regarding Convergence to put it
>>> in
>>> the webbrowsers by default?
>
> Well one very big problem was that Peter was not prepared to do the
> work of engaging in the standards area himself. Which is an almost
> certain way to ensure that a proposal isn't going to thrive.
>
> Another problem that most PKI alternatives suffer from is the
> 'hydrogen car' mentality. According to a popular Internet meme the
> reason that we aren't driving hydrogen cars RIGHT NOW is that the evil
> Detroit car companies are desperate to kill it at any cost. Now
> imagine that you are a startup trying to build a hydrogen car, would
> that be a productive mindset to base business assumptions on? I think
> it is pretty clear that approaching the problem of building a hydrogen
> car from the point of view that all advice from GM and Ford was
> ill-intentioned attempts at sabotage would cut the startup off from
> essential knowledge.
>
> So Peter's approach of beginning his proposal with a canard against
> existing CAs and refusing to correct the public impression he gave was
> not a good start.
>
> The DNSSEC crowd suffer from this as well. I keep telling them that
> until they start signing the root with something more secure than
> RSA1024 then all they are doing is an extended science project.
> Unfortunately the only way I can get them to change is to raise this
> issue at senior US policy levels which has the unfortunate side effect
> of reinforcing the (entirely justified) belief that ICANN is just a US
> govt. proxy.
>
>
>> The main issue is who are the notaries? If they're simply reflecting back
>> "Yup, I see this valid CA cert" then they aren't adding a whole lot of value
>> for the amount of risk they introduce, and if they're making their own
>> judgement about the validity of the certificates on some other ground they
>> just become a type of Certificate Authority themselves. Who pays for that
>> infrastructure, and what is their motive?
>
> And that leads to the second problem of how reliable is that notary
> infrastructure going to be.
>
>
>> Firefox and Chrome are both working on implementing "key pinning" (and
>> participating in the standardization process for it) which won't "free us
>> from the CA system" but will at least ameliorate one of the worst aspects
>> which is that any two-bit CA anywhere in the world can issue a certificate
>> for any site, anywhere.
>
> And don't forget that we should deploy CAA as part of that solution.
>
> I am also working on ways of bringing the key pinning information into
> the DNS space so that we can get a 'secure on first use'. That is the
> reason I am interested in DNS Encryption. It is a change to the DNS
> ecosystem which will break the ludicrous practice of taking DNS
> service from the resolver advertised in DHCP. Which opens up the
> opportunity for ditching a bunch of legacy DNS stupid (500 byte
> message limit for instance).
>
>
>> The IETF is working on standardizing "Certificate Transparency", Chrome is
>> implementing it, and at least one CA is participating. This again doesn't
>> free us from the CA system, but it does make the public certificates
>> auditable so that mis-issuance could theoretically be detected.
>
> There is certainly a lot of functional overlap. I think that CT has
> pretty much addressed the major use case used to justify Convergence.
> But it does not meet the real goal of Convergence
>
>
>
>
>
> --
> Website: http://hallambaker.com/



-- 
Website: http://hallambaker.com/
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to