Before going too much further down this path, it's useful to think about 
what CAs are actually needed for, and what certificates are actually needed 
for - certificates like those discussed below don't seem to match any 
existing requirements.

Right now, CAs like Verisign and Thawte certify that a certain 
cryptographic key is possessed by the same people who have the right to use 
a particular name in a distinct geographic location. End-users depend on 
other services - the court system, which polices trademark namespace 
collisions (with the help of aggrieved plaintiffs), and the DNS system, 
which correlates the names to IP addresses for machines which use the keys 
discussed above - in order to get a working system.

Efforts to find other uses for x.509 certs across organizational boundaries 
haven't been especially successful; Verisign tried to sell personal certs, 
but my impression is that this business line has been deprecated or 
abandoned. Thawte has a personal cert project (in fact, I participate in it 
as a "notary"), but its actual utility is unclear. (I think it's a neat 
demonstration/experiment, but don't know of anyone who's using it for 
anything important).

In particular, the server certificate model discussed above won't translate 
well to personal certs, because we accept namespace collisions for personal 
names. Thawte's solution to that has been to tie their personal certs to 
unique numbers, not names; that makes collisions less likely, but makes 
them harder to detect, as there's no way for me to find out whether or not 
someone else is using one of my numbers. (They seem to accept drivers' 
license numbers, US social security numbers, passport numbers, and perhaps 
more. I've only notarized US people's identities, so haven't had firsthand 
experience with foreign documents.) Also, there's no judicial enforcement 
mechanism available when a namespace collision occurs - if someone uses my 
trademark, the process for making them stop is well-documented, if 
expensive. If someone else is using my social security number, my only 
effective recourse is to try to get the police interested in investigating 
that, and it's quite possible that they won't understand my complaint, or 
won't consider it important.

So, apropos the discussion of creating an alternative to VeriThawte - 
perhaps a good first step would be replicating what they already do. A next 
step might be understanding what value they're providing, and who it's 
being provided to, and by what means, and examining whether or not that 
goal can be reached by more efficient or otherwise better means.

Further, it might be useful to elaborate more fully the notion of "trusting 
government" with respect to identification - I'm not sure that people trust 
the government to do things correctly so much as they believe that the 
government's judicial system will accept the government's identification 
system as convincing proof of authority, or acceptance of the government's 
identification system as a reasonable and sufficient exercise of care in 
the conduct of one's business. Traditional familial or affinity-based 
identifications are much more reliable, when they're available - but they 
don't necessarily enjoy the same presumption of validity in a bureacratic 
system that the bureacracy's own documents do, which leads to a preference 
for less accurate identifications which have a lower risk of negative 
consequences.

That level of trust - or that fear of negative consequences - may or may 
not be true in any given transaction, which modifies or eliminates the need 
for insurance or complicated CPS statements. If a CA and the actors who 
rely upon it are within the same organizational boundary, it's unlikely 
that their interests will diverge such that a serious dispute will occur; 
and if a dispute is unlikely or impossible, it's not so important to 
prepare for its negative consequences.

The complicated and peculiar thing about the existing business of running a 
CA is that the people who depend on the accuracy of the CA's statements 
aren't the ones who are paying the CA, nor do they have a traditional 
contract or agreement with the CA. Either they're in a position of relying 
upon someone who owes them no duty (which means that the services provided 
may be of dubious reliability), or a duty is created on the part of a third 
party who isn't being paid directly for that obligation .. so it's 
difficult to provide a good service priced appropriately. Current 
extra-organizational or public CA's have found a solution which is an ugly 
hack - they charge a single flat fee (or one of a few tiered fees) to 
another party to a different transaction, and then try to limit their 
obligations by using a non-negotiated (and, to a lay audience, mostly 
incomprehensible) certification practice statement (CPS).

While this allows CA's to collect money and limit their liability, it also 
limits (or eliminates) their utility to the people who want or need to rely 
on their services - not the operators of web servers (who pay the bills), 
but the operators of web browsers, who want to be assured that they're 
communicating with the people they think they are.

At 07:29 AM 12/23/99 , Creed Millman wrote:
>Real-To:  Creed Millman <[EMAIL PROTECTED]>
>
>What if each country's government were to act as CAs?  To me this seems the
>most logical solution.  They already issue passports, driver's licenses,
>etc., - why not digital certificates?  This would also tie in well with
>Massimiliano Pala's vision: "Indeed I see certificates to be like ID cards:
>you can sign contracts, get married or vote using a digital ID certificate."
>I feel that the government is the only entity that people would trust enough
>to put the entire infrastructure into place.

--
Greg Broiles
[EMAIL PROTECTED]
PGP: 0x26E4488C

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to