Ok, non-payment situation .... right out of previous email. in court of law ... involving civil litigation ... both parties have their own lawyers
ok, from SSL/TLS with TPP CA .... and mutual authentication; both parties have a TTP CA and both parties have certificates from their respective TTP CAs. Just as in the financial four corner model ... there are situations where the merchant bank and the consumer bank may be the same financial institution; in which case they refer to the transaction as "on us". The four corner model doesn't absolutely preclude a financial institution being the same for both parties .... but it operates in such a way that it allows that the merchant can be certified by one entity and the consumer can be certified by another entity ... and it isn't required as part of mutual authentication ... that the certifying agency be the same for both the merchant and the customer. The whole point of the detailed discussion of the merchant and the consumer in the four corner model was to show the chain of trust going in both direction. The chain of trust goes in both directions .... one for the merchant and one for the consumer .... in the financial four corner model The chain of trust tries to go in both directions .... one for the server and one for the client ... in the SSL/TLS mutual authentication four corner model. The problem in the TTP CA SSL/TSL (almost) PKI for mutual authentication .... is the server doesn't actually have any business relationship with the client's certifying body and the client doesn't actually have any business relationship with the server's certifying body, without valid business relationship and recourse ... there is only the facade of a trust network but one doesn't actually exist (in either direction). The TTP CA business model with stale, static certificates is actually even worse (note that a TTP CA model with online certification doesn't suffer from this horribly inverted business model). The client is paying the TTP CA for the client's certificate .... which exists for the benefit of the server (and in some cases the existance of a client certificate can actually be to the detriment of the client). The server is paying the TTP CA for the server's certificate .... which exists for the benefit of the client. Not only does the stale, static certificate paradigm have the exchange of value occur between the wrong parties .... but the exchange of value between the wrong parties lends itself to precluding a real network of trust being implemented. When the client pays for their own certificate to the client's TTP CA, for the server;s benefit, it precludes there being a valid business relationship and chain of trust between the server and the client's TTP CA. When the server pays for their own certificate to the server's TTP CA, for the client's, it precludes there being a valid business relationship and chain of trust between the client and the server's TTP CA. In the online (financial) four corner model, the server pays the client's TTP CA for certification of the client; that creates the basis for legal obligation between the client's TTP CA and the server for a valid chain of trust. The real, major difference between a 3-corner TTP CA and a four corner TTP CA .... isn't whether it is financial or not, it is whether there is mutual authentication/certification or only single authentication/certification. The real, major problem with TTP CAs implemented with stale, static certificates ... is it fails to create a legal relationship between the certification authorities and the relying parties. The server's TTP CA has no obligation to the client, and the client's TTP CA has no abligation to the server. Therefor there is no chain of trust, therefor it is just a pure fabrication about any real trust network. As previously noted. GSA attempted to overcome this total lack of the TTP CA model to any resumblance of valid business proposition by all of their contracts. It has been pretty well shown that any entity can sue any other entity. A merchant can sue a customer for fraud and a customer can sue a merchant for fraud. The issue is can a merchant sue a certifying body for anything at all with regard to what a customer does. Typically a merchant sueing a certifying body with regard to some customer's action is only to the extent that the certifying body has some obligation to a merchant. In a simple TTP CA stale, static certificate model, without a business relationship between the merchant and the consumer's TTP CA , no business relationship has been created between the consumer's TTP CA and the merchant. Therefor there is no grounds to sue. Similarly, a client sueing a certifying body with regard to some merchant's action is only to the extent that the cerifying body has some obligation to the client. In a simple TTP CA stale, static certificate model, without a business relationship between the consumer and the merchan'ts TTP CA, no business relationship has been created between the merchant's TTP CA and the consumer. Therefor there is no grounds to sue. All four corners exist in all situations when there is any kind of mutual certifying process between two parties; aka 1) PARTY A, 2) PARTY A's certification institutioon, 3) PARTY B, 4) PARTY B's certification institution. The horrendous problem in the traditional TTP CA stale, static certificate business model is that 1) no obligation is created between PARTY A's certification institution and PARTY B 2) no obligation is created between PARTY B's certification institution and PARTY A so no trust network ever actually exists. As been repeated pointed out in the past several posts, that is possibly one of the motificating factors in all of the GSA contracts with TTP CAs and relying-parties ... creating a valid basis for a trust network. Possibly there is some other assumptions that aren't being clearly understood. In general, certifying bodies exist when there is little or no reason for two totally complete strangers (that might have some business opportunity) for trusting each othter. Two entities that have some past business relationship may not feel they need independent certification authority. However, whether a certifying process is used or not doesn't preclude either party from performing some fraudulent act. This goes back to the whole original concept of these certification bodies in the first place, which is to establish trust when there is usually no other basis for trust. Trust doesn't elimiante fraud but it possibly lowers its probability. In the four corner, credit model there is quite a bit that is guarenteed. As previously pointed out, the merchant's financial institution is actually on the hook for merchant deliverying contracts goods or services or refunding money (as per the bankrupt airlines example). I don't understand the issue about the four corner model and identity fraud. A business model and obligations don't preclude fraud. They may somewhat lower its probability but it doesn't lower it. As been repeatedly mentioned in the past several posts, quite a bit of identity fraud is a shared secret issue. X9.59 is specifically targeted at 1) strongly authenticated transactions 2) elimination of the account number as a shared secret (and therefor as a subject of identity fraud) 3) elimination of additional identity information or shared secret information as a means of authenticating the transaction X9.59 is agnostic with respect to identification .... only performing authentication. However, X9.59 can contribute significantly to reduction in identity fraud by eliminating any requirement for shared-secret and/or identity information as part of the financial transaction. Furthermore, the X9.59 characteristic applies to 2-corner model, 3-corner model, and 4-corner model The issue of somebody's use of a 4-corner model as opposed to choosing a 2-corner model or a 3-corner model seems to have nothing at all to do with identity fraud issues. The business issues of 2-corner, 3-corner, and 4-corner business process implementations is almost totally orthogonal to the business issues related to identity fraud. The design of the transactions and the selection of what kind of information is required for the transactions can have a significant effect on identity fraud. My assertion is that the prevalence of identity fraud is at least partially a characteristic of the significant reliance on shared-secrets and identity related information in much of the deployed infrastructures today (totally independent of how many corners they may have). The further assertion (as in the X9.59 case), if it is possible to steal every piece of information in the transaction and still not perform a fraudulent transaction based on that information, several types of existing fraudulent activity would be eliminated. x9.59 references: http://www.garlic.com/~lynn/index.html#x959 repeated references to gsa contract: http://www.garlic.com/~lynn/aadsm12.htm#22 draft-ietf-pkix-warranty-ext-01 http://www.garlic.com/~lynn/aadsm12.htm#41 I-D ACTION:draft-ietf-pkix-sim-00.txt http://www.garlic.com/~lynn/aadsm12.htm#42 draft-ietf-pkix-warranty-extn-01.txt http://www.garlic.com/~lynn/aadsm14.htm#37 Keyservers and Spam http://www.garlic.com/~lynn/aadsm14.htm#47 UK: PKI "not working" http://www.garlic.com/~lynn/aepay12.htm#1 Confusing business process, payment, authentication and identification -- Internet trivia, 20th anv: http://www.garlic.com/~lynn/rfcietff.htm [EMAIL PROTECTED] on 6/28/2003 3:32 pm wrote: I believe we are in agreement with what the fourth corner does in a trust network, it is like the relying party's insurance, link to the law, etc. A problem as I see it is what the fourth corner (or TPP CA) is prepared to vouch for in an non-payment situation. It can surely not make any warranties (in contrast to payments) about the value and credibility of the client, only that it has performed an RA and certification process according to some written practice statements. Does the RP need a business relation with the trust network in order to be able to sue a misbehaving client who is repudiating its actions? Some people claim that, I don't. If the signature can be technically derived to the client's key, the client is toast. Is the fourth corner is supposed to protect the RP from client key misuse/theft? I would say that this would be a very bad idea as the key may have been used to open information banks of incredible value that no insurance will cover and is not possible to rollback either. Authentication <> Payments! But if the faulty operation is due to certification errors, probably due to identity fraud? Then we enter the real CA liability scene. RP contracts have the same function as US SW licenses: To make you aware that nothing is really guaranteed, it is sold "as is". Is this acceptable? This is hard to say, it is rather depending on how frequent errors are and the consequences of those. A problem is that a fourth corner can do nothing about identity fraud which in my opinion makes it less viable regardless of its possible legal value. So of course it is good to have business relations between parties in a trust network, but don't expect to get compensation when things go REALLY wrong. It is also rather hard to run court trials regarding information theft as it is hard to put a value on copied information. Due to these problems I believe the fourth corner is something that bank-operated trust networks should not take for granted. Particularly if it causes business parties to pay for received messages rather than (or in addition to) for sending messages.