On 7/09/11 7:34 AM, Fredrik Henbjork wrote:

Here's another gem related to the subject. In 2003 CAcert wished to have
their root certificate added to Mozilla's browser, and in the resulting
discussion in Bugzilla, Mozilla cryptodeveloper Nelson Bolyard had the
following to say:

"I have no opinion about the worthyness of the particular CA being
proposed in this bug.  I don't know who it is yet.  But my question would be:

Does webtrust "attest" to this CA?


That was a clear NO at that time, A WebTrust audit was never done. And they had the same problem that Thawte had in those days, one guy with everything in his head, and his sock draw.

But they got better! We can estimate progress from the DRC audit [1] which is like a quality superset of WebTrust. 2003 to 2008 they didn't meet that standard. By around 2009 they were in reasonable shape [2]. Some pluses, some minuses of course [3].


I think that should be one of the criteria.

PKI is about TRUST.  All root CAs that are trusted for (say) SSL service
are trusted EQUALLY for that service.  If we let a single CA into mozilla's
list of trusted CAs, and they do something that betrays the publics' trust,
then there is a VERY REAL RISH that the public will lose ALL FAITH in
the "security" (the lock icon) in mozilla and its derivatives.

Yes. This is a double edged sword. The idea is to make it seamless for users, who don't understand. This is good, hard to argue with. It works, sort of. But there are consequences.

On the one hand, all CAs fight to do the minimum they can; once in, they can sell certs at lowest cost because their certs look just like anyone elses. No differentiation or discrimination is possible (marketing terms) because any increase in quality is not perceived by the market.

Hence, the well-known race-to-the-bottom, which is a big factor in DigiNotar.

On the other hand, persistent frustration on the part of the regulator/vendor/user community has led to higher and greater and more expensive barriers. The CAs have not fought this because it works for them. So, this has led to entrenchement of the industry, and a deadlock where all attention goes to more and more audit, and it has become even more unlikely that architectural change is possible.

We don't want that to happen.  If that happens,  mozilla's PKI becomes
nothing more than a joke.   If you want to see mozilla's PKI continue to
be taken seriously, you will oppose allowing un attested CAs into
mozilla's list of trusted root CAs."

https://bugzilla.mozilla.org/show_bug.cgi?id=215243

Given the recent CA stories, I can't help but smile at that comment...

Yes. I hope Nelson can see now that the seeds of his fears were sewn by the very limitations he described, not by any particular CA or rejection of same.

As James [4] pointed out, "Shades of Sarbannes Oxley." This is the same thing that happened in the finance industry when Enron collapsed. Enron lead directly to Sarbannes-Oxley, which all claimed would stop the problem. Never again!

But it didn't, and in fact, it provided a blanket of complexity for the next problem. Global financial crisis ... was in big part enabled by the inability for banks and finance companies to assess their risks ... and this was in part because governance was forced into compliance-more by Sarbanes-Oxley. Which also provided them the plausibility and liability cover.

"We did what you told us to do, look, here's our auditor's invoice!"

So what do we do now? We review the framework and double the work. Claim it'll never happen again. And wait for the next blow-up.



Instead, we could reduce the overall barriers, and erect smarter barriers. Push more work across to the users, push more failures onto the users. Open up the market; allow CAs to brand themselves, and allow them to increase their quality to the point where it works for their users ... differentiation ... rather than force them to decrease the quality to compete penny-wise for a commodity product.

Problem with this standard marketing & econ view is that ... all the institutions are composed of geeks. It's greek. Mumble jumble. No, this market is different, we can make it perfect, we got crypto! Got a patch? Go speak to PKIX...



iang




[1] Disclosure: I was the auditor that started and terminated the DRC review. DRC is a rewrite (simply put) of WebTrust that was much better, much more mid 00s instead of mid 90s. More aligned to the strength of EV, approximately.

[2] But I terminated them because they couldn't meet DRC within the resources ... they probably could have met WebTrust, again given the resources.

The problem that CAcert faces now is that they've (arguably) caught up to WebTrust, but now they face: WebTrust + Baseline Requirements + Extended Valuation (possibly) + vendor review. Each of those is a serious audit, with serious costs.

So the bar in terms of quality and quantity has been lifted. (Also they face other issues.)

[3] If you are interested in the story, read "An Open Audit" in 95 pages.... http://iang.org/papers/open_audit_lisa.html

[4] James, like myself, comes from a dark past of payment systems. Which is why he knows how to apply lessons from finance across to other security contexts.
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to