I wasn't intending to get into a broader discussion about the merits of 
encryption. My initial point was two-fold: First, that there are a lot of 
different scenarios to consider--too many, in fact. Second, that a "good" cert 
could be used for any of those bad things, although the use of certs is not 
necessary in all cases. 

Regarding use of the term "bad", what does anyone think about this as an 
alternative: "furtherance of criminal activity"

Granted the term criminal might be a bit subjective, but I can't think of good 
uses for trojans or botnets or ransomware. And I would hope that CA's would 
agree that furtherance of criminal activity is an inappropriate use of the PKI 
system?

Thoughts? 


  Original Message  
From: Ryan Sleevi
Sent: Thursday, May 26, 2016 11:44 PM‎

On Thu, May 26, 2016 at 1:58 PM, Phillip Hallam-Baker
<[email protected]> wrote:
> What has encryption got to do with it?

The "bad" raised was unrelated to certificates, publicly trusted or
otherwise. As Nick also pointed out, a number of the "bad" is just as
accomplish through other means independent of certificates - whether
using raw public keys, DANE, etc. That is, the concerns raised were
about TLS, not about certificates.

...snip...

> Now the problem here is that there are also folk who just want to turn on
> encryption and that is all and they don't care about doing online commerce
> or banking. They just want to keep their email secret. And that is fine. But
> that does not mean that people who only want to do confidentiality should
> rip up the infrastructure that is designed to serve a different purpose.

It would seem you're suggesting that CAs aren't the right
infrastructure to enable the Internet's growth and user's security,
which may be true, but would be a surprising statement to make.
Otherwise, the choice of the term "rip up" to suggest that, regardless
of original intent, the infrastructure may better serve users' and
security more by doing something more broadly scoped seems...
unnecessary simplistic.

Put differently, even if it were true that the goal of the Web PKI was
to "prevent bad," it still suffers from the same problem - first, the
definition of "bad" posited on this thread is largely related to
encryption (first and foremost), and thus orthogonal to certificates,
but in several of the remaining cases, the definition of bad is a
statement that users have unrealistic expectations about what
certificates can/do provide. Ironically, those unrealistic
expectations may have been caused by CAs themselves and by their
marketing teams.

So to address these "bad" uses of certificates, it's necessary as the
community to decide whether encryption is bad, whether the
'undesirable' uses of encryption and the desire to prevent such uses
is worth the risk to the 'good' uses of encryption and the desire to
promote them, and to decide on what the reasonable and realistic
expectations of certificates should be.
‎
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to