Re: Name-constraining government CAs, or not

2015-05-15 Thread Gervase Markham
On 15/05/15 00:01, Ryan Sleevi wrote:
 On Thu, May 14, 2015 9:02 am, David E. Ross wrote:
 
  With cyberwarfare constantly discussed in the news, U.S. Congress, and
  other venues, it appears to me that government CAs should indeed be
  restricted to the TLDs of their respective jurisdictions.

  Furthermore, since governments can apply pressure (often secretively) to
  commercial enterprises, a similar restriction should be applied to all
  commercial and non-government CAs.  In this case, they should be
  restricted to TLDs of those jurisdictions where they have registered and
  whose governments have granted the CAs permission to operate.
 
 Unsurprisingly, this would make online communications less secure, rather
 than more secure.

Can we stop discussion of this particular point (name-constraining
non-government CAs) here, as it's been ruled explicitly out of scope?
Thanks :-)

 I think there's also the broader consideration of whether Mozilla's policy
 interests are served by promoting borders on the Internet, which David's
 proposal certainly does, but the broader question invariably does.
 https://www.mozilla.org/en-US/about/manifesto/ , Items 2, 4, and 6 all
 seem relevant to the broader discussion of the implications of such a
 policy.

It would be helpful if you could expand upon this point, and the
relationship you see between those three principles and the proposal.

 In case it's not clear, I think imposing name-constraints on CAs to be bad
 for the web and not a scalable solution, even if it appears attractive :)

Again, expansion on these points would be appreciated :-)

Gerv

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Name-constraining government CAs, or not

2015-05-15 Thread Gervase Markham
On 14/05/15 17:02, David E. Ross wrote:
 There is an ongoing dispute between the U.S. and China whether the
 government in China is behind attacks on both government and commercial
 computer systems in the U.S.  This is NOT to question the
 trustworthiness of the government of China but to give one example of
 the possibility of hostile actions by a government certification
 authority (CA).

Is there any evidence that these attacks involve certificates issued by
a government CA?

 Snowden revealed how the U.S. NSA is intercepting Internet
 communications in bulk.  This is NOT to question the trustworthiness of
 the government of the U.S. but to give another example of the
 possibility of hostile actions by a government CA.

Is there any evidence that these attacks involve certificates issued by
a government CA?

 With cyberwarfare constantly discussed in the news, U.S. Congress, and
 other venues, it appears to me that government CAs should indeed be
 restricted to the TLDs of their respective jurisdictions.

You will need to expand on that observation if you want to turn it into
an argument.

 Furthermore, since governments can apply pressure (often secretively) to
 commercial enterprises, 

This assertion is relevant and should be discussed, as it relates to my
question 1). Is the government told its own CA to issue a certificate
exactly the same situation as this government pressured a commercial CA
in its jurisdiction to issue a certificate?

 a similar restriction should be applied to all
 commercial and non-government CAs.  In this case, they should be
 restricted to TLDs of those jurisdictions where they have registered and
 whose governments have granted the CAs permission to operate.

This suggestion is wildly impractical, and also out of scope for this
discussion - note out of scope point 1).

Gerv
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Name-constraining government CAs, or not

2015-05-15 Thread Matt Palmer
Everything that Ryan says below, is what I would have said if I were as
eloquent.

- Matt

On Fri, May 15, 2015 at 11:49:39AM -0700, Ryan Sleevi wrote:
 On Fri, May 15, 2015 1:52 am, Gervase Markham wrote:
   On 15/05/15 00:01, Ryan Sleevi wrote:
   I think there's also the broader consideration of whether Mozilla's
   policy
   interests are served by promoting borders on the Internet, which David's
   proposal certainly does, but the broader question invariably does.
   https://www.mozilla.org/en-US/about/manifesto/ , Items 2, 4, and 6 all
   seem relevant to the broader discussion of the implications of such a
   policy.
 
   It would be helpful if you could expand upon this point, and the
   relationship you see between those three principles and the proposal.
 
 2) The Internet is a global public resource that must remain open and
 accessible.
 
 - By introducing a demarcation of power/privilege by government or not
 (which still suffers from the definitional issue that you've entirely
 danced around :P), it ostensibly undermines the notion of global (e.g. if
 you're required, by local jurisdiction, to only use CAs approved by
 Country A, then you can no longer apply for any arbitrary name but only
 those CAs approved by Country A can issue to)
 
 - By introduction restrictions on what government CAs can do, it creates a
 different standard of openness. That is, it presumes corporations are
 trustworthy and governments are not (this is your first question, which is
 implicitly answered in the positive in any discussion pro-constraint), and
 corporations can openly participate while governments cannot.
 
 4) Individuals' security and privacy on the Internet are fundamental and
 must not be treated as optional.
 
 - In the pro-constraint case, which again arguably answers the first
 question you pose by saying Yes, there is a difference, it introduces
 the beginnings of technical control to introduce borders on the Internet,
 by (effectively) restricting what domains individuals can purchase, and
 further encouraging a centralization of names that are in government
 control. Using my previous message as an example, I may choose to purchase
 resources from China and the US under the assumption that they will not
 mutually aid eachother in compromising me, even if they may both
 independently attempt to.
 
 6) The effectiveness of the Internet as a public resource depends on
 interoperability (protocols, data formats, content), innovation and
 decentralized participation worldwide.
 
 - Name-constraining CAs has the effect of centralizing protocols
 (vis-a-vis DNS)
 
 - Name-constraining CAs has the effect of discouraging interoperability by
 introducing multiple semi-subjective criteria into the discussion of trust
 (What is a Government CA, What is a government TLD)
 
   In case it's not clear, I think imposing name-constraints on CAs to be
   bad
   for the web and not a scalable solution, even if it appears attractive
   :)
 
   Again, expansion on these points would be appreciated :-)
 
 I'm sure just as you wish for me to expand on this, I wish to understand
 what specifically you're asking about.
 
 This conversation has been raised multiple times, and I've raised multiple
 objections and concerns each time it's been raised. For better or for
 worse, I've written fairly extensively on this list why it's a bad idea,
 and why various proposed modifications are equally problematic.
 
 I've at length answered your first question posed - which is whether there
 is a fundamental difference - and pointed out the myriad of ways in which
 there is not.
 
 I've at length answered your second question posted - which is whether it
 makes things better or worse - and demonstrated the many ways in which it
 can make things worse.
 
 I mean, the definitional issues alone should show how subjective this is.
 For example, I note you didn't include under potential government CAs as
 LuxTrust (Established in November 2005 through a partnership between the
 Luxembourg government and major private financial actors in Luxembourg),
 or what the subtle implications are for Certinomis (which partners with La
 Poste to perform identity validation, which is the mail service of France,
 is definitionally an autonomous public enterprise since 1 January 1991,
 when it was split from DGP, but which arguably operates within the
 imprimatur of the French government)
 
 I posit these as simply two examples of many to indicate the very
 difficult challenges with separating 'operational capability'. However,
 would we argue that a CA is wholly independent if it was seeded by
 In-Q-Tel? Why or why not?
 
 What about a CA operated by Verizon Business (aka GTE Cybertrust/Baltimore
 Cybertrust?) Some are concerned that it may be participating in NSA
 shenanigans (e.g.
 http://rt.com/usa/168752-germany-boots-verizon-over-spying/ )? Or what
 about several major US telecom providers' complicity in the NSA's
 warrantless wiretapping -
 

Re: Name-constraining government CAs, or not

2015-05-15 Thread Ryan Sleevi
On Fri, May 15, 2015 1:52 am, Gervase Markham wrote:
  On 15/05/15 00:01, Ryan Sleevi wrote:
  I think there's also the broader consideration of whether Mozilla's
  policy
  interests are served by promoting borders on the Internet, which David's
  proposal certainly does, but the broader question invariably does.
  https://www.mozilla.org/en-US/about/manifesto/ , Items 2, 4, and 6 all
  seem relevant to the broader discussion of the implications of such a
  policy.

  It would be helpful if you could expand upon this point, and the
  relationship you see between those three principles and the proposal.

2) The Internet is a global public resource that must remain open and
accessible.

- By introducing a demarcation of power/privilege by government or not
(which still suffers from the definitional issue that you've entirely
danced around :P), it ostensibly undermines the notion of global (e.g. if
you're required, by local jurisdiction, to only use CAs approved by
Country A, then you can no longer apply for any arbitrary name but only
those CAs approved by Country A can issue to)

- By introduction restrictions on what government CAs can do, it creates a
different standard of openness. That is, it presumes corporations are
trustworthy and governments are not (this is your first question, which is
implicitly answered in the positive in any discussion pro-constraint), and
corporations can openly participate while governments cannot.

4) Individuals' security and privacy on the Internet are fundamental and
must not be treated as optional.

- In the pro-constraint case, which again arguably answers the first
question you pose by saying Yes, there is a difference, it introduces
the beginnings of technical control to introduce borders on the Internet,
by (effectively) restricting what domains individuals can purchase, and
further encouraging a centralization of names that are in government
control. Using my previous message as an example, I may choose to purchase
resources from China and the US under the assumption that they will not
mutually aid eachother in compromising me, even if they may both
independently attempt to.

6) The effectiveness of the Internet as a public resource depends on
interoperability (protocols, data formats, content), innovation and
decentralized participation worldwide.

- Name-constraining CAs has the effect of centralizing protocols
(vis-a-vis DNS)

- Name-constraining CAs has the effect of discouraging interoperability by
introducing multiple semi-subjective criteria into the discussion of trust
(What is a Government CA, What is a government TLD)

  In case it's not clear, I think imposing name-constraints on CAs to be
  bad
  for the web and not a scalable solution, even if it appears attractive
  :)

  Again, expansion on these points would be appreciated :-)

I'm sure just as you wish for me to expand on this, I wish to understand
what specifically you're asking about.

This conversation has been raised multiple times, and I've raised multiple
objections and concerns each time it's been raised. For better or for
worse, I've written fairly extensively on this list why it's a bad idea,
and why various proposed modifications are equally problematic.

I've at length answered your first question posed - which is whether there
is a fundamental difference - and pointed out the myriad of ways in which
there is not.

I've at length answered your second question posted - which is whether it
makes things better or worse - and demonstrated the many ways in which it
can make things worse.

I mean, the definitional issues alone should show how subjective this is.
For example, I note you didn't include under potential government CAs as
LuxTrust (Established in November 2005 through a partnership between the
Luxembourg government and major private financial actors in Luxembourg),
or what the subtle implications are for Certinomis (which partners with La
Poste to perform identity validation, which is the mail service of France,
is definitionally an autonomous public enterprise since 1 January 1991,
when it was split from DGP, but which arguably operates within the
imprimatur of the French government)

I posit these as simply two examples of many to indicate the very
difficult challenges with separating 'operational capability'. However,
would we argue that a CA is wholly independent if it was seeded by
In-Q-Tel? Why or why not?

What about a CA operated by Verizon Business (aka GTE Cybertrust/Baltimore
Cybertrust?) Some are concerned that it may be participating in NSA
shenanigans (e.g.
http://rt.com/usa/168752-germany-boots-verizon-over-spying/ )? Or what
about several major US telecom providers' complicity in the NSA's
warrantless wiretapping -
http://www.wired.com/2010/01/fbi-att-verizon-violated-wiretapping-laws/ ?

There are so many more important things to spend our time on with regards
to improving trust. Simply embracing and encouraging greater transparency
(e.g. through Certificate