Some comments:

>I agree with everything you say above: the PKIX should be a way of reliably
mapping between domain names and keys, and nothing more. 
[JR]  Incorrect.  From 5280:
"The goal of this specification is to develop a profile to facilitate
   the use of X.509 certificates within Internet applications for those
   communities wishing to make use of X.509 technology.  Such
   applications may include WWW, electronic mail, user authentication,
   and IPsec.  In order to relieve some of the obstacles to using X.509
   certificates, this document defines a profile to promote the
   development of certificate management systems, development of
   application tools, and interoperability determined by policy."

> Value judgements and policy belong at different layers of the stack that
PKI (ideally, in layers with more user control and less exposure to 50-150
jurisdictions).
[JR] Your statement above was a policy statement and value judgment.  By
doing so, you are placing a policy constraint on PKI that does not exist in
the RFCs.

>Unfortunately, the people who set up the PKIX didn't understand this, and
put a lot of foolish policy-like language into the hybrid CPS-Baseline
Requirements-industrial complex.
[JR] I think they understood it quite well. It was designed to map keys to
subject information and permit a variety of uses.  In that, PKI is quite
flexible as evidenced by the broad use across a variety of platforms and
applications (including email, access control, sign-on services, SSL, etc).

Jeremy

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to