On Thursday 12 May 2005 06:19, Duane wrote:
> Actually the funniest thing was said the other day, Mark Shuttleworth
> came out and said the root certificate for Thawte was kept in his
> underpants draw for the first 2 years of operation. Needless to say the
> audience was in stitchs over that one...


I must be really boring, I don't find that odd at
all.  Where would you keep the root cert?  You
surely don't believe all those stories about
m of n copies distributed in hardened bunkers...

A CA root cert is no big deal.  If it gets lost,
just mint another one and let everyone know
you lost it and to watch out for it.  Chances
are nobody will try and do anything with it,
and after a while, the expiry date will pass.
As long as there is no active attack scenario
on CAs there is practically no risk of any cert
being misused, be it root cert or any of the
Shmoo or Microsoft dodgy certs.  Concentrate
on business, and use paper bags to avoid
hyperventilation.

> As Gerv points out (as have others), currently there are no minimums and
> commercial CAs (not necessarily security people) with the intent of
> increasing their own market share to the detriment of others (since SSL
> has been such a huge success and all), I'm just not seeing altruism from
> anyone here but Gerv, yourself and the mozilla foundation.

Well, I have to agree with ... everyone here :)

The essence of the game is to get SSL and
the like protection to the users.  This does not
happen if the CAs can't make any money;
either the CAs have to be removed or we
have to find a way to make them some money,
or they have to do it for free.  Economics is
not really negotiable at the physics level.

Altruism doesn't really cut it.  It is too slippery
and subject to perversion at the hands of those
who are smarter.  This is why I occasionally
stress that Mozilla needs to think about their
goals - if they have strong goals about what
and why they exist, this overcomes any weak
wristed altruism and defends them from attack.

So far, the goal appears to be to deliver good
tools to the average user.  But this is under
challenge;  specifically, the security people
here have interest in the technical user who
appreciates hard core security, not the
average user.  This debate needs to be
aired one day.


> > As I've said before, I don't think use of certs in general and SSL in
> > particular should be artificially constrained to fit the perceived
> > requirements of the Internet e-commerce market. To get back to Gerv's
> > draft paper, I think his discussion is consistent with that approach:
> > He's proposing leaving the existing browser CA/SSL model and UI in place
> > for legacy CAs and certs, and basically creating an extension to the
>
> Not quite, unknown CAs (he doesn't stipulate although I assume, root
> certs not imported) and self signed certs won't display the lock, which
> is a fairly fundamental change, and judging by the stats with the link
> Ian posted, unknown CAs issue more publicly accessible SSL certificates
> then Verisign does.

The most important thing that the browser UI
can do is to promote more SSL.  If twice as
many people use SSL but it has a slight
vulerability, that's much better than perfect
system that is only used by half as many.

So, it would be ok for the lock not to be
shown as long as the browser does not
scare the user away or waste their time on
popups, IMHO.  If self-signed certs could be
used exactly as HTTP, then we could replace
HTTP with self-signed certs and everyone
wins.

Even the CAs who now know who to go
and sell certs to.

iang
-- 
http://iang.org/
_______________________________________________
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security

Reply via email to