Gervase Markham wrote:
> My definition of a "sucky" code signing cert is one in which the 
> information inside about the owner of the cert isn't accurate.

It's a bad definition of a "sucky" code signing certificate.

You don't care *who* the owner of the cert is. What you care about is if 
he intends to use his signing cert to distribute spyware extensions. And 
his identity tells you nothing about that.

Cf http://www.schneier.com/crypto-gram-0402.html#6
"In an ideal world, what we'd want is some kind of ID that denotes 
intention." "This is, of course, ridiculous, so we rely on identity as a 
substitute. In theory, if we know who you are, and if we have enough 
information about you, we can somehow predict whether you're likely to 
be an evildoer"
Schneier then goes on explaining how this doesn't really work in the 
real world. But here you're lower that that, you only have the identity, 
and nothing to base upon to predict if the owner is likely to be an 
evildoer. And when I say that you have the identity, I'm being generous. 
I'm afraid with certain CA a personnal code signing certificate only 
proves the credit card transaction made to obtain it has not yet been 
repudiated. Or that you have not yet found out it was charged on a very 
recent bank account opened with a fake ID.

What you'd really want is some process to review the requester (or his 
code) before granting him the code signing certificate. You would want 
to freely customize that process to find out what works best, what the 
best compromises are between convenience and security.
But we know in advance no process with be perfect. So what's really 
important is to have the absolute garantee that his certificate gets 
revoked as soon as you decide it should. And very efficient 
dissemination process for revocation information, relying on the user 
downloading tens of crl from various CAs will never fit the bill.

All those things will work infinitively better with a private 
certificate authority than with the various public code signing 
authorities that exist.

Also about the worldwide identity vetting and validation, they are few 
public certificate authorities that really can do that. If really 
needed, I think it would be easier for the mozilla community to find a 
recognised community member to do face to face authentication on almost 
any place on the planet than for them.
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to