Paul Hoffman wrote, On 2008-06-09 18:31 PDT:
> At 2:56 PM -0700 6/9/08, Nelson B Bolyard wrote:

>>> a CA that tries to save the customer by revoking the possibly-compromised
>>> domain's keys is overstepping its responsibility.
>>
>> The keys in question are not "possibly compromised". They are compromised.
>> Period.
> 
> Until we see any evidence of this in the real world, we disagree.

I think we have different definitions of compromised.  I define it as:
when the named party no longer has exclusive control over the corresponding
private key, then the public key (and the cert bearing it) is compromised.
The relying parties then have only false assurances of the bindings.

>> A CA who informs it relying parties that it can no longer assure the binding
>> that it once certified is fulfilling its responsibility, not exceeding it.
> 
> a) Let's be careful with our assertions. The CA can still assure the 
> binding of the name to the public key; what they can't assure is the 
> unique control over the private key.

I claim that the binding of a name to a public key REQUIRES that the named
party holds unique control over the private key.  What other definition is
meaningful?

What good is it to assert that "When you encrypt with this public key,
you can be confident that the decryption will be performed by the party
named in this cert OR any of millions of others." ?  What kind of
"binding" is that?  Of what value is it?

Similarly, what good is it to assert that "When you verify a signature
with this public key, you can be confident that the signature was
generated by the party named in this cert OR any of millions of others." ?
What kind of "binding" is that?  Of what value is it?

> b) Does revoking a certificate inform a relying party of anything 
> significant? For better or worse, revocation is a giant one-bit club.

Yes, it causes relying parties to stop relying on the no-longer assured
binding (if their software recognizes the revocation, which FF3 does,
and FF2 can if enabled).

> c) What responsibilities does a CA have to relying parties? I have 
> never signed a contract with any of them. 

A CA's responsibility to offer REAL assurances to its relying parties
should be motivated by its own self interest.  It's value to subscribers
is directly a function of the number of relying parties who trust it.
Analogous to broadcasters who measure the value of their airtime to
advertisers by the number of "eyeballs" that watch their content.
A CA who is not trusted (by virtue of not being in popular products)
offers little value (in some markets) and finds few subscribers.
Relying parties who find they can no longer trust the certified bindings
of a certain CA stop trusting that CA.  A CA whose base of relying parties
is diminishing is a CA in decline.

> To be frank, browser vendors have more responsibilities to relying
> parties than CAs do. That's why the browser vendors carefully check CPSs
> and enforce rules about them.

Agreed, and part of the discussion here is: is it acceptable to Mozilla
to continue to "trust" certs from CAs who don't revoke timely in the
presence of evidence?  I hope not.  Such CAs provide only "security
theater", IMO.

>> The keys ARE compromised.  A CA who refuses to timely revoke a cert with a
>> known compromised key abrogates any public trust.
> 
> "Any"? Do you really think that a typical Firefox user, even when 
> this is all explained to them, would be as strident as you are here?

Actually, I think most of them already ARE more strident about this than
I am.  There is already HUGE distrust of CAs among the Mozilla community,
especially developers.  For a decade now there have been ongoing calls
for Mozilla to ship a browser with an empty trusted CA list.  There are
STILL calls for removing Verisign certs from the trust list because of the
issuance of some bogus Microsoft certs some years ago.  The number one
impediment to the acceptance of EV by the Mozilla community was that it
was initially promoted by the very CA they most despised.

There are repeated calls for Mozilla to adopt an SSH-like KCM strategy of
"trust and store any cert, regardless of issuer, on first sight (if there is
not already a cert stored and trusted for that host name), and complain
when any host offers a cert different than that offered in the past."
That is the number one most frequently repeated request in Mozilla mailing
lists (private and public), newsgroups and bugs for years and years now.
There is a significant percentage of Mozilla leaders who are sympathetic
to that view.  Many of them subscribe fully to the view that certs from any
OpenSSL user are just as trustworthy as certs from any institutional CA.

Of course, the Achilles-heel of KCM is absent revocation.  The recent Debian
debacle has resulted in the creation of a 3 MB (compressed) key revocation
list (KRL) that people now propose to carry forward in perpetuity in all
software.  That monstrosity offers CAs an opportunity to demonstrate some
real differentiation and value here, the value of revocation, something that
KCM will never offer.  I believe the 3MB KRL that resulted from the Debian
debacle is the stake that the PKI community can finally drive through the
heart of KCM, if it has the will to do so.

CAs can use this as an opportunity to say "Users of PKI with our certs
don't need to carry around 3MB Key revocation lists.  They don't need new
software.  They just use the OCSP revocation that is already built in to FF3
and IE7, and they're covered, because the CAs will do a competent job of
revocation for them."  That's real value that any Debian user can see.

Any CA who, in light of this opportunity, chooses to demonstrate a desire to
"put his best foot forward" and "save face" for himself and his subscribers,
rather than showing his commitment to proactive revocation,
discredits himself (and perhaps the whole PKI community) to the people who
most want to see PKI fail and be supplanted by KCM in Mozilla products.

> But, if you feel that way, why don't you get the people who the 
> relying parties trust most, the browser vendors, to fix the problem? 

That's actually what motivates me to participate in this thread.

> Why rely on the CAs, who have repeatedly shown themselves to be 
> half-hearted at best?

The browser vendors can fix the problem by really enforcing trusted cert
policies that really protect their users.  That means putting pressure
on CAs.  A fear of enforcing policies (or having weak policies) due to
fear of lost market share, ultimately undermines trust in PKI.

Regards,
/Nelson B
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to