Duane wrote on Tue, 30 Mar 04, 3:59 PM:
> Nelson Bolyard wrote: 
> 
> > Most of the info that travels the net needs no "protection".  Its 
> > value is SO LITTLE that no-one would spend a penny to collect it. 
> > We shouldn't be concerned that that info is not encrypted. 
> 
> What about the info sent by "dissidents" in china and locked up because 
> they said something against the china government, I doubt it's a factor 
> they don't want security, but a cost factor that it isn't deemed needed 
> till someone gets arrested :) 

I'm glad you brought up "dissidents" in China. I'll use "China" as an example here, 
though the situation could apply to any country which firewalls off it's internet 
connections through proxies (to control access to information within the country or 
eavesdrop on communication outside). I will use "China" in quotes to represent these 
countries as a whole. I do this because I have personal knowlege of people in one or 
more of these kinds of countries whose lives would be at risk if their crypto systems 
are compromised.

This is one scenario I'm very worried about. Right now, today, dissidents can create 
websites that are SSL protected. These sites are secured from government prying, even 
though "China" firewalls off it's network from the world. "China" does allow tunneld 
SSL connections (which it would need to to allow any sort of e-commerce to occur). 
Because SSL has strong authentication, I know that the "Chineese" government cannot 
tap the information.

Now introduce the situation proposed: either a "less secure" CA (one with a weaker, or 
unknown vetting process) or even worse, self-signed certificates. Now the "Chineese" 
government (in your example) simply has to get their own certs for each of those 
websites (or create their own on the fly), and they can suddenly sit as 
man-in-the-middle listening to everything said on your supposedly secure connection. 
There is *NO WAY* to detect the substitution!

If Mozilla starts including these kinds of policies, I would have to recommend against 
using mozilla to these friends. It's not worth trusting their life that some unvetted 
CA "got it right".

> I believe Indy Media groups round the world provides self signed certs 
> at present for this very reason, to allow anonymous submissions that 
> can't be intercepted when sending to their websites... I also believe 
> it's not just china they have to worry about, apparently someone had 
> their door kicked in by the FBI because they were listed in the DNS 
> records... 

Their communication is only secure between themselves --- only if they explicitly 
trust their certificates. They can do that today. If, however, they trust *ANY* 
selfsigned certificate, they could have both china and the FBI kicking in their door.

bob
_______________________________________________
mozilla-crypto mailing list
[EMAIL PROTECTED]
http://mail.mozilla.org/listinfo/mozilla-crypto

Reply via email to