Everything that Ryan says below, is what I would have said if I were as
eloquent.

- Matt

On Fri, May 15, 2015 at 11:49:39AM -0700, Ryan Sleevi wrote:
> On Fri, May 15, 2015 1:52 am, Gervase Markham wrote:
> >  On 15/05/15 00:01, Ryan Sleevi wrote:
> > > I think there's also the broader consideration of whether Mozilla's
> > > policy
> > > interests are served by promoting borders on the Internet, which David's
> > > proposal certainly does, but the broader question invariably does.
> > > https://www.mozilla.org/en-US/about/manifesto/ , Items 2, 4, and 6 all
> > > seem relevant to the broader discussion of the implications of such a
> > > policy.
> >
> >  It would be helpful if you could expand upon this point, and the
> >  relationship you see between those three principles and the proposal.
> 
> 2) The Internet is a global public resource that must remain open and
> accessible.
> 
> - By introducing a demarcation of power/privilege by "government" or not
> (which still suffers from the definitional issue that you've entirely
> danced around :P), it ostensibly undermines the notion of global (e.g. if
> you're required, by local jurisdiction, to only use CAs approved by
> Country A, then you can no longer apply for any arbitrary name but only
> those CAs approved by Country A can issue to)
> 
> - By introduction restrictions on what government CAs can do, it creates a
> different standard of openness. That is, it presumes corporations are
> trustworthy and governments are not (this is your first question, which is
> implicitly answered in the positive in any discussion pro-constraint), and
> corporations can openly participate while governments cannot.
> 
> 4) Individuals' security and privacy on the Internet are fundamental and
> must not be treated as optional.
> 
> - In the pro-constraint case, which again arguably answers the first
> question you pose by saying "Yes, there is a difference", it introduces
> the beginnings of technical control to introduce borders on the Internet,
> by (effectively) restricting what domains individuals can purchase, and
> further encouraging a centralization of names that are in government
> control. Using my previous message as an example, I may choose to purchase
> resources from China and the US under the assumption that they will not
> mutually aid eachother in compromising me, even if they may both
> independently attempt to.
> 
> 6) The effectiveness of the Internet as a public resource depends on
> interoperability (protocols, data formats, content), innovation and
> decentralized participation worldwide.
> 
> - Name-constraining CAs has the effect of centralizing protocols
> (vis-a-vis DNS)
> 
> - Name-constraining CAs has the effect of discouraging interoperability by
> introducing multiple semi-subjective criteria into the discussion of trust
> ("What is a Government CA", "What is a government TLD")
> 
> > > In case it's not clear, I think imposing name-constraints on CAs to be
> > > bad
> > > for the web and not a scalable solution, even if it appears attractive
> > > :)
> >
> >  Again, expansion on these points would be appreciated :-)
> 
> I'm sure just as you wish for me to expand on this, I wish to understand
> what specifically you're asking about.
> 
> This conversation has been raised multiple times, and I've raised multiple
> objections and concerns each time it's been raised. For better or for
> worse, I've written fairly extensively on this list why it's a bad idea,
> and why various proposed modifications are equally problematic.
> 
> I've at length answered your first question posed - which is whether there
> is a fundamental difference - and pointed out the myriad of ways in which
> there is not.
> 
> I've at length answered your second question posted - which is whether it
> makes things better or worse - and demonstrated the many ways in which it
> can make things worse.
> 
> I mean, the definitional issues alone should show how subjective this is.
> For example, I note you didn't include under "potential government CAs" as
> LuxTrust ("Established in November 2005 through a partnership between the
> Luxembourg government and major private financial actors in Luxembourg"),
> or what the subtle implications are for Certinomis (which partners with La
> Poste to perform identity validation, which is the mail service of France,
> is definitionally an autonomous public enterprise since 1 January 1991,
> when it was split from DGP, but which arguably operates within the
> imprimatur of the French government)
> 
> I posit these as simply two examples of many to indicate the very
> difficult challenges with separating 'operational capability'. However,
> would we argue that a CA is wholly independent if it was seeded by
> In-Q-Tel? Why or why not?
> 
> What about a CA operated by Verizon Business (aka GTE Cybertrust/Baltimore
> Cybertrust?) Some are concerned that it may be participating in NSA
> shenanigans (e.g.
> http://rt.com/usa/168752-germany-boots-verizon-over-spying/ )? Or what
> about several major US telecom providers' complicity in the NSA's
> warrantless wiretapping -
> http://www.wired.com/2010/01/fbi-att-verizon-violated-wiretapping-laws/ ?
> 
> There are so many more important things to spend our time on with regards
> to improving trust. Simply embracing and encouraging greater transparency
> (e.g. through Certificate Transparency) could go a long way in
> establishing an objective basis for discussions about trustworthiness, and
> the quality of audits, and the compliance and adherence to technical
> requirements, rather than gut speculation and the jingoistic
> sentimentality it inevitably invites.
> 
> -- 
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
> 

-- 
"Riding through the tunnel at 200 is something you should approach in the
same way you'd bonk your neighbours wife.  A once in a while thing.  Do it
often and you'll get caught."
                -- Kel, aus.moto

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to