On Nov 7, 2012, at 8:33 PM, Randy Bush <ra...@psg.com>
 wrote:

>>> sita has cache and has agreed to arin's silliness.  rama, trying not to
>>> put load on CA publishers, rsyncs sita's cache and wants to validate it.
>>> hanuman rsyncs rama's cache, ...
>> 
>> In the above circumstance, how do rama and hanuman find and consider 
>> the terms and conditions of the CA's CP/CPS prior to building reliance
>> upon its surmised authentication and/or non-repudiation capabilities?
> 
> they don't.  they are too busy running networks, and assume CAs do their
> damned jobs.


We may be working on somewhat different assumptions, given that the PKIX 
certificate architecture was defined to be just like an other Internet 
PKI certificate system, i.e. there is no automatic legal binding between 
the CA and the relying party, and relying parties are responsible for 
determining whether their application of the certificates of a given CA 
is appropriate in light of applicable CP and CPS.  RFC 5280 states this 
as a basic requirement of the PKIX profile in section 2:

   "A certificate user should review the certificate policy generated by
    the certification authority (CA) before relying on the authentication
    or non-repudiation services associated with the public key in a
    particular certificate.  To this end, this standard does not
    prescribe legally binding rules or duties."

In your example, is sita taking on this responsibility on behalf of rama 
and hanuman?  It is not apparent that this type of application is within
the standard's stated requirements, so it should not be surprising that 
there's an impedance mismatch occurring.

FYI,
/John



_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to