Hi Dmitris,"I don't understand how this is related to the discussion in this
thread."I just clarified what EU centric perspective means in terms of
millions of surrogate* QSCDs and QESCs in circulation today.* Surrogate QESC
means any eIDAS Article 28 (1) - (3) non-compliant ESC that is issued as QESC.
Similarly its true for QSCDs.BTW, I'm well aware of EU complaint procedure but
its a separate issue - in reality any attempt to initiate investigation fails
because of those private embassies mentenioned in my email. In this matter
Commission's public clarification should be very helpful.In short, the EU
centric perspective relying on so called SBs doesn't work - its not just SBs
under Directive 1999/93/EC (eIDAS), the same is true for data protection,
competition and other relevant sectors.Hope this helped.Thanks,M.D.Sent from my
Galaxy
-------- Original message --------From: Dimitris Zacharopoulos
<[email protected]> Date: 7/15/22 20:36 (GMT+02:00) To: "Moudrick M. Dadashov"
<[email protected]> Cc: [email protected] Subject: Re: Mozilla
Campaign: securityriskahead.eu
Moudrick,
I don't understand how this is related to the discussion in this
thread. If you have a specific concern about an existing TSP, the
eIDAS framework allows you to file official complaints to the
corresponding SB. If this process fails, you will have a good case
to present with specific evidence/facts.
Regarding the Mozilla article, I am disappointed about the fact that
it was assigned to a "strategies" company and is loaded with
inaccurate and "noisy" statements without any concrete evidence to
support the statements made.
"This campaign has been developed by Mozilla to help drive
industry reform. Learn more about Security Risk Ahead and
our business at www.mozilla.com. This website is
operated by Hill+Knowlton Strategies | July 2022"
I was hoping for a more objective and balanced approach. The eIDAS
framework is not completely "trash". Can things be improved? Of
course they can. But we need specific proposals with proper
justification to improve things for the benefit of all Relying
Parties. I didn't go through the details of the article because it
is already extremely biased with statements like:
WHY ARE QWACs
A PROBLEM?
Why QWACs are not secure
Discover how QWACs
can put you at risk
How QWACs
harm online rights
How QWACs and eIDAS can harm individual
cyber security
Online threats in the EU are on the
rise
How QWACs create risk
Help browsers protect you from harm
How eIDAS legislation could put
fundamental rights at risk
eIDAS will open users up to attacks
Help browsers protect internet users
which deterred me from reading any further. It almost feels like it
tries to "brainwash" readers with statements like that.
I'm also surprised that whoever took money to build this website on
behalf of Mozilla, completely ignored the Mozilla principles and
manifesto:
"We are committed to an internet that elevates critical
thinking, reasoned argument, shared knowledge, and verifiable
facts."
"We are committed to an internet that catalyzes collaboration
among diverse communities working together for the common good."
and in some ways, it is also related to "Commercial
involvement in the development of the internet brings many
benefits; a balance between commercial profit and public benefit
is critical."
I hardly see any "balance" being promoted in this article.
Dimitris.
On 15/7/2022 1:59 μ.μ., 'Moudrick M.
Dadashov' via [email protected] wrote:
Good day, Phillip
If we notice "US-centric" perspective, we should
also notice EU-centric perspective that relies on unelected,
unaccountable public sector bodies doing "supervisory body
business" under patronage of pan-European corporations.
To be more specific let me remind you millions of
surrogate QSCDs and QESCs in circulation today - the product of
corruption network led by the Swedish telco-banking cartel - the
semi-state Telia Company AB (aka corruption academy) and two
well known laundromats - Swedbank and SEB.
BTW, the ORGANIZED GROUP has its own embassy in
Brussels.
I wish someone from mr. Norbert Sagstetter’s team
could join the discussion.
Thanks,
M.D.
Sent from
my Galaxy
-------- Original message --------
From: Phillip Hallam-Baker <[email protected]>
Date: 7/15/22 13:32 (GMT+02:00)
To: "Enrico E." <[email protected]>
Cc: [email protected], "[email protected]"
<[email protected]>
Subject: Re: Mozilla Campaign: securityriskahead.eu
I don't
necessarily disagree with the argument being made there. But I
think it would be best if all three parties (Government,
Browser Providers, CAs) moved past the original framing of
'Should Google or Government decide who you trust' because it
is the wrong question:
The user
should decide who to trust.
As we have
seen, Google has unilaterally exercised its ability to drop
roots out of its store effectively forcing CAs to shut down or
be transferred to other operators. Mozilla might think it has
a dog in this fight but it is not really Mozilla that is the
target of the very real national security concerns that have
been raised.
Looking at
those concerns from a US-centric silicon valley libertarian
perspective is probably not helpful when the decision makers
here are Europeans and their elected representatives.
On Fri, Jul 15, 2022 at 8:29
AM Enrico E. <[email protected]>
wrote:
Dear all,
I would
like to bring in a different view on the whole topic. In
April this year this
article https://rdcu.be/cJQpU
on Qualified Certificates for
Website Authentication (QWAC) was published in the journal
Datenschutz und
Datensicherheit (data protection and data security) . We
explained why QWACs can
help to protect the user in European Union, why the QWAC is
an important
feature of the security of the digital infrastructure in the
EU, and why the
new proposal of the commission is a step in the right
direction. In the article,
there are preliminary suggestions for how to implement the
new article 45 proposal.
Thanks,
Enrico
[email protected]
schrieb am Donnerstag, 14. Juli 2022 um 14:30:17 UTC+2:
As
with the Google response, you are taking a very
US-centric approach to lobbying that is only going
to reduce the chance of influencing the outcome.
EU politics are not the same as US politics.
Case
in point, the site isn't translated into German,
French or Spanish. There aren't very many English
speakers left in the EU after Brexit.
Unlike
US politicians who are mostly self important
numbskulls, most MEPs are very serious people.
These are (mostly) the politicians who have
complete command of their briefs. They are not
going to be convinced by the argument that QWACs
represent a threat to the security of the Internet
while LetsEncrypt's free certificates with no
validation whatsoever are just peachy because that
is a really bad argument to try to make.
The
EU concern here is that Google is setting itself
up to be the monopoly provider of trust in the Web
and that eliminating EV certs is a part of that
strategy. If you want to influence the outcome of
this issue, you need to provide them with an
alternative approach to achieving that end. I will
explain how to do that at the end, first I have to
explain my point of view.
The
heart of VeriSign Class 3 and the Extended
Validation requirements was establishing the
accountability of the subject. It was never about
identity. The notion was that if someone is going
to be engaged in criminal activity, they would
only do so as long as it was profitable. Creating
one fake corporate identity is simple, creating
disposable identities is deliberately hard.
Knowing that you are doing business with a company
registered in the US has different risks to one
registered in the UK or in Germany and the risks
of dealing with a company registered in Nigeria or
Russia are very different again.
VeriSign
Class 3 and EV both outperformed my expectations.
They weren't perfect but security is the
management of risk, not risk elimination. Neither
Firefox nor Chrome is free from sin either and
writing code without security vulnerabilities is a
task that is entirely within the scope of the
developers while providing the interface between
the online world and the offline world is not.
At
this point the WebPKI and TLS are over 25 years
old and they are the only parts of the Web
security infrastructure that actually deliver. The
only other Internet security protocol that is
close to being a home run is SSH and that is
really just SSL for Telnet.
Rather
than constantly attacking the only parts of the
system that are functional, we would do a lot
better to look at how Internet security is
failing. The big problem of Web Security is
Phishing and that is a problem because we still
rely on passwords and the way we make use of
passwords is the worst possible way.
The
original security goal for the WebPKI was to make
shopping online as secure as shopping in bricks
and mortar stores. That was all. Online
brokerages, banks were not part of it: We only had
40 bit encryption because of the export controls.
The whole issue was persuading Visa and Mastercard
to let merchants use the Web.
What
we missed (well I did at least) was the fact that
95% of Web activity doesn't involve payments and
never will (sorry Web3 people). So the WebPKI was
overbuilt for 95% of Web sites. But we didn't
notice that at first because doing RSA1024 was
such a drag on the server that the only people
using SSL were the people who really, really
needed it.
So
now we have a situation where the needs of the 95%
of sites that only need lightweight encryption
with minimal endpoint authentication are driving
the whole show. The WebPKI designed by Michael
Baum and Warwick Ford has been more or less
dismantled.
Rather
than going back, I think we should go forward. The
WebPKI was a technology of its day. We were
working with limited machines and limited
technology. We only ever made authenticating the
bank to the customer work, TLS Client auth has
never been practical because of the achilles heel
of PUBLIC Key Cryptography - we punted on the
critical task of managing the private key. And now
that the user has dozens of devices, that is a
critical problem. Fido overcomes some of the
issues of TLS-CA but not the key management one.
I
have been telling people that Threshold Key
cryptography is the way to address this issue for
six years now. First they said go away and write a
draft, so I did that. And then they said go away
and write code, so I did that. And then they said
write an application that uses the code, so I did
that.
What
I want to do now is to take a look at that code
and see if we could use these ideas in existing
Web browsers.
My
model of the Web is different. In my model, the
goal is to put the user in control. So coming back
to QWACs, the decision to use QWACs should lie
with the user and the user alone. It is not for
the browser provider to make that decision. Same
for any root store inclusion: it is a user
decision.
Now
of course, very few users have the ability to make
such decisions themselves and the few of us who do
do not have the time. So the real issue is that
the user should have the ability to delegate that
choice to the trust provider of their choice.
In
my view, curating CA roots belongs with
Anti-Virus, DNS resolution as a personal trust
service. When a user acquires a new device, they
connect it to their personal account which in turn
connects to their chosen trust service provider.
The user should have the ability to choose and to
re-choose. So if I choose McAfee and they muck up,
I can switch to Symantec, or to some open source
collaborative effort, or to Microsoft, Google or
Apple or whoever else decides to offer such
services.
The
current code is a command line mode tool that only
implements catalogs for bookmarks, contacts,
passwords, applications, etc. I will be announcing
that at HOPE Friday next:
https://www.youtube.com/watch?v=zrBv717w8yY
The
main obstacle to implementing the trust service
part of the scheme is that it needs to be built
around a browser which was impractical until very
recently when Microsoft started shipping WebView2:
https://github.com/hallambaker/PhillsHypotheticalBrowser
The Mesh technology means that I can work
from the assumption that every device Alice uses
is provisioned with the set of private keys and
key shares that enable her to do any
cryptographic operation I might need.
On Wed, Jul 13, 2022
at 11:08 PM Kathleen Wilson <[email protected]>
wrote:
All,
This is just FYI that Mozilla has launched a
campaign called "Security Risk Ahead" to provide
information about eIDAS article 45.2, which (as
currently written) could force browsers to accept
QWACs even when they do not fully comply with
browser root store requirements.
https://securityriskahead.eu/
Cheers,
Kathleen
--
You received this message because you are subscribed
to the Google Groups "[email protected]"
group.
To unsubscribe from this group and stop receiving
emails from it, send an email to
[email protected].
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/c10bc945-4b0c-4fcd-b438-98b0e4364f8bn%40mozilla.org.
--
You received this message because you are subscribed to the Google
Groups "[email protected]" group.
To unsubscribe from this group and stop receiving emails from it,
send an email to [email protected].
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAMm%2BLwh8n-kRJW2TfWOjLh0EcFh5%3Dr6EViRMm6tNAR4zh4pc4g%40mail.gmail.com.
--
You received this message because you are subscribed to the Google
Groups "[email protected]" group.
To unsubscribe from this group and stop receiving emails from it,
send an email to [email protected].
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/E1oCJ2z-0003IQ-1T%40submission02.runbox.
--
You received this message because you are subscribed to the Google Groups
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/a14d716d-a13c-8184-2eb1-9b1e2588a89b%40it.auth.gr.
--
You received this message because you are subscribed to the Google Groups
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/E1oCQ0k-0003Gb-Ix%40submission02.runbox.