Ram0502 wrote:

I've done with my CA cert page?

http://www.hecker.org/mozilla/ca-certificate-list



I believe there is value to the community in having an easy to compare page; your page is a solid start but I would add all the included CAs as well and I think breaking out some fields (use of secure hardware, some policy details) would be of tremendous benefit.


Taking a leaf from my experiences over on the digital currency world, where the users are fundamentally responsible for ensuring that the issuers protect their metal (there's about $80m protected in that world, from memory), I would suggest that fundamentally it is a grand idea to present opinions on CAs.

Do it - in any way you feel fit !  Create a page
like Frank's and present the info you think
important.

1 if MF breaks out the practices and policies of the various CAs
(included or otherwise) into some 'obvious' security attributes
AND



I'd be surprised if MF has the budget or the staff to offer any opinion that could sway the CA market. As MF is already responsible for constructing the root list, for them to offer any opinion as to the incumbents in that list is to open a can of worms.

2 if there are obvious groupings of security levels
then one could make an argument for using the naturally occuring
thresholds to define best practices for various applications and
thereby continue to abstain from making potentially risky decisions in
favor of again leveraging market driven best practices.

For example perhaps enough CAs offer OCSP/CRL pointers in certificates
that MF  can take advantage of that to require this feature for roots
to be trusted to issue software publishing credentials.

This has the excellent feature of strongly encouraging competition
between the root providers for example to include automatic revocation
checking, or anti-spyware policies or whatever practical considerations
emerge as supported by the open market.



That would all be grand stuff on an open market table by some interested and responsible participant. Unfortunately, MF is a role player, and may be conflicted if it takes on any bias beyond the highly technical role of constructing the root list.


Well, yes, but only if we and other browser/email vendors actually do


something with the issuerLogo :-)



I suspect we could get the for profit CAs to implement this in the MF source base as they would clearly benefit from the branding. As I understand it the real question is if the security value (which is obvious to me) is conveyable apparent to whomever controls the UI real estate.


Yes, this appears to be the big issue. See the recent announcement by Microsoft, that might help to explain the case to the UI people.

I think there are many workable approaches to this. For example
allowing the user to make a (perahps deeply hidden at first)
configuration selection about it. Generally this concept would be well
leveraged by asking the user one or two questions to tailor their setup
(rate your clue and your daring/parnoia on a 5 point scale) and adjust
their security policy (XPIs must be signed with revocation, must be
signed by anyone, don't care) and UI (show me brand, hide this stuff)
based on their selection. I think this is a much better approach to
balancing usability and security needs.



Those are some interesting ideas to white board with the UI people.

BTW Thanks Frank for your ongoing hard work here - managing the root
list and policies for MF is not a glorious job but it is an essential
one.



Hear, hear!

iang

--
News and views on what matters in finance+crypto:
       http://financialcryptography.com/

_______________________________________________
mozilla-crypto mailing list
[email protected]
http://mail.mozilla.org/listinfo/mozilla-crypto

Reply via email to