On Fri, May 15, 2015 1:52 am, Gervase Markham wrote: > On 15/05/15 00:01, Ryan Sleevi wrote: > > I think there's also the broader consideration of whether Mozilla's > > policy > > interests are served by promoting borders on the Internet, which David's > > proposal certainly does, but the broader question invariably does. > > https://www.mozilla.org/en-US/about/manifesto/ , Items 2, 4, and 6 all > > seem relevant to the broader discussion of the implications of such a > > policy. > > It would be helpful if you could expand upon this point, and the > relationship you see between those three principles and the proposal.
2) The Internet is a global public resource that must remain open and accessible. - By introducing a demarcation of power/privilege by "government" or not (which still suffers from the definitional issue that you've entirely danced around :P), it ostensibly undermines the notion of global (e.g. if you're required, by local jurisdiction, to only use CAs approved by Country A, then you can no longer apply for any arbitrary name but only those CAs approved by Country A can issue to) - By introduction restrictions on what government CAs can do, it creates a different standard of openness. That is, it presumes corporations are trustworthy and governments are not (this is your first question, which is implicitly answered in the positive in any discussion pro-constraint), and corporations can openly participate while governments cannot. 4) Individuals' security and privacy on the Internet are fundamental and must not be treated as optional. - In the pro-constraint case, which again arguably answers the first question you pose by saying "Yes, there is a difference", it introduces the beginnings of technical control to introduce borders on the Internet, by (effectively) restricting what domains individuals can purchase, and further encouraging a centralization of names that are in government control. Using my previous message as an example, I may choose to purchase resources from China and the US under the assumption that they will not mutually aid eachother in compromising me, even if they may both independently attempt to. 6) The effectiveness of the Internet as a public resource depends on interoperability (protocols, data formats, content), innovation and decentralized participation worldwide. - Name-constraining CAs has the effect of centralizing protocols (vis-a-vis DNS) - Name-constraining CAs has the effect of discouraging interoperability by introducing multiple semi-subjective criteria into the discussion of trust ("What is a Government CA", "What is a government TLD") > > In case it's not clear, I think imposing name-constraints on CAs to be > > bad > > for the web and not a scalable solution, even if it appears attractive > > :) > > Again, expansion on these points would be appreciated :-) I'm sure just as you wish for me to expand on this, I wish to understand what specifically you're asking about. This conversation has been raised multiple times, and I've raised multiple objections and concerns each time it's been raised. For better or for worse, I've written fairly extensively on this list why it's a bad idea, and why various proposed modifications are equally problematic. I've at length answered your first question posed - which is whether there is a fundamental difference - and pointed out the myriad of ways in which there is not. I've at length answered your second question posted - which is whether it makes things better or worse - and demonstrated the many ways in which it can make things worse. I mean, the definitional issues alone should show how subjective this is. For example, I note you didn't include under "potential government CAs" as LuxTrust ("Established in November 2005 through a partnership between the Luxembourg government and major private financial actors in Luxembourg"), or what the subtle implications are for Certinomis (which partners with La Poste to perform identity validation, which is the mail service of France, is definitionally an autonomous public enterprise since 1 January 1991, when it was split from DGP, but which arguably operates within the imprimatur of the French government) I posit these as simply two examples of many to indicate the very difficult challenges with separating 'operational capability'. However, would we argue that a CA is wholly independent if it was seeded by In-Q-Tel? Why or why not? What about a CA operated by Verizon Business (aka GTE Cybertrust/Baltimore Cybertrust?) Some are concerned that it may be participating in NSA shenanigans (e.g. http://rt.com/usa/168752-germany-boots-verizon-over-spying/ )? Or what about several major US telecom providers' complicity in the NSA's warrantless wiretapping - http://www.wired.com/2010/01/fbi-att-verizon-violated-wiretapping-laws/ ? There are so many more important things to spend our time on with regards to improving trust. Simply embracing and encouraging greater transparency (e.g. through Certificate Transparency) could go a long way in establishing an objective basis for discussions about trustworthiness, and the quality of audits, and the compliance and adherence to technical requirements, rather than gut speculation and the jingoistic sentimentality it inevitably invites. _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy