On Aug 22, 2008, at 4:22 PM, Jonathan Schleifer wrote:

As many of you might already know:

http://rss.slashdot.org/~r/Slashdot/slashdot/~3/371835374/article.pl

I will take this as an opportunity to state my opinion on our problems with certs :)

If we have a CA, we need to warn for self-signed certs. But if we do it like Firefox 3 - which some here considered the right way - it will scare users away - they can't talk or won't use crypto at all.

Another problem is that a CA means a single point of failure. If that CA is broken, someone can forge everyone. Plus I don't trust CAs generally.

So what's left?

* Self-signed keys
* GPG
* SRP

The problem with self-signed keys is that the fingerprint you need to verify is very long and most users just won't verify it.

The problem with GPG is that this is geeks-only.

The problem with SRP is bots.

So, I think we shouldn't concentrate on one of these. We should have more than 1 way. For example, if we have SRP and self-signed certs, we'd be fine. For bots, we could also add a CA so bots of the same owner trust each other by just having the root cert.

Any thoughts on this?

Yes, split the trust decision from the encryption part.

Self-signed certs, CA-signed certs, and GPG keys provide the same thing: a way to exchange a key to use in a stream cipher to create an encrypted channel.

This is something that should be standard at the XSF level: how to use those keys to create a encrypted channel.

The trust requirements vary so much from person to person, from organization to organization, that you'll never get a one-true-way.

Some people (like me) will use SRP most of the time, with an occasional full signature comparison, specially if I already have said signature from a trusted source (ie, I met you and you gave me your signature).

Others will require full blown CA certification and they will only trust keys from certain CA's.

For example, I can see myself (if my client supported it) doing something like this:

* membership on group SAPO is restricted to users whose keys are signed by the SAPO CA;
 * group 'friends' requires at least SRP.

The client wouldn't let me add contact to such groups without verifying my desired level of paranoia.

I'm new to this list, and admit that I'm not an expert in SSL/TLS, and all this stuff, but high-level, "trust" is a local-policy thing, and as such difficult to make "standard".

Best regards,
--
Pedro Melo
Blog: http://www.simplicidade.org/notes/
XMPP ID: [EMAIL PROTECTED]
Use XMPP!


Reply via email to