Re: What we want [was: Audit requirements for government CAs]

2008-04-02 Thread Gervase Markham
Eddy Nigg (StartCom Ltd.) wrote: Currently the ratio of EV certs is below 1% of overall SSL secured web sites. If EV doesn't get a significant market share, your priorities might have been wrong and we should have addressed other issues as well. I don't really have the bandwidth to dive

Re: What we want [was: Audit requirements for government CAs]

2008-04-02 Thread Gervase Markham
Kyle Hamilton wrote: Please tell me how to completely disable all Mozilla Foundation included CAs without having to individually change the trust settings on all of them? I can't trust Mozilla's certificate policy to protect my interests -- I can't trust Mozilla's policy to ensure that

Re: What we want [was: Audit requirements for government CAs]

2008-04-02 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: Yes, this is a good argument in favor of EV and EV is exactly intended for that. Just a pity the rest of the public PKI is left broken, no matter what the reasons are (by design, lack of interest, commercial interests, etc), because there is more to protect

Re: Audit requirements for government CAs

2008-04-02 Thread Frank Hecker
Gervase Markham wrote: Frank Hecker wrote: It's a reasonable proposal, and we did look into doing this. Unfortunately there are .com domains and perhaps other non-.kr domains with certs issued by CAs in the KISA-rooted hierarchy. This is not unique to KISA and Korea either AFAIK. I

Re: What we want [was: Audit requirements for government CAs]

2008-04-02 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: Gervase Markham wrote: The EV distinction is clear. And EV exists precisely because the line between DV and IV/OV is fuzzy, and it would have been very difficult to correctly discern the difference programmatically. This is a key point worth emphasizing. We use the

Re: What we want [was: Audit requirements for government CAs]

2008-04-02 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: Frank Hecker: (As a side note, based on my experience with and reading about industry dynamics, I think that advances in PKI-related technologies are much more likely to occur in new protocols and new products than in mainstream cases like browsing SSL web

Re: What we want [was: Audit requirements for government CAs]

2008-04-02 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: I don't want to go off on a tangent, but I think the Skype model is more significant than you think. There is a problem that nobody knows what encryption this is and which keys are involved and who has access to these keys etc. Skype is fine for me, but I wouldn't exchange

Wrong problem. Re: What we want [was: Audit requirements for government CAs]

2008-04-01 Thread Anders Rundgren
I want people to finally realize that signed and encrypted e-mail has a much more limited scope than originally envisioned and there is no policy or technical solution that can change that. Due to the limited scope of S/MIME the problems associated with CAs do not really exist. The only public

Re: Audit requirements for government CAs

2008-04-01 Thread Frank Hecker
Benjamin Smedberg wrote: At the time, I believe I counter-proposed that the government certificate in question should be trusted to validate the identity of sites within that country: i.e. a Korean government CA would have a limited root which could only verify the identity of sites within

Re: What we want [was: Audit requirements for government CAs]

2008-04-01 Thread Frank Hecker
Kyle Hamilton wrote: What do I want? I want a use-case which expresses why the certificate validation policies (as implemented by NSS) must be so draconian. I want a use-case which expresses, clearly, why certificate validation problems have to be modal and completely disrupt the user's

Re: What we want [was: Audit requirements for government CAs]

2008-04-01 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: This brings up a point that was implied by my previous comments in response to Eddy, but that I want to make explicit: IMO the reason why we have a CA policy is *not* because the Mozilla Foundation wants to be or needs to be the CA police, tracking down and punishing bad

Re: What we want [was: Audit requirements for government CAs]

2008-04-01 Thread Eddy Nigg (StartCom Ltd.)
Kyle Hamilton: On Tue, Apr 1, 2008 at 11:15 AM, Frank Hecker [EMAIL PROTECTED] wrote: In the thawte case you cite, thawte changed its practices to start issuing DV certs from a CA hierarchy not previously used for that, but its practices were still within boundaries outlined in our

Re: Wrong problem. Re: What we want [was: Audit requirements for government CAs]

2008-04-01 Thread Nelson Bolyard
Anders Rundgren wrote: I want people to finally realize that signed and encrypted e-mail has a much more limited scope than originally envisioned and there is no policy or technical solution that can change that. Due to the limited scope of S/MIME the problems associated with CAs do not

Re: Audit requirements for government CAs

2008-04-01 Thread Eddy Nigg (StartCom Ltd.)
Nelson Bolyard: Frank Hecker wrote: Benjamin Smedberg wrote: At the time, I believe I counter-proposed that the government certificate in question should be trusted to validate the identity of sites within that country: i.e. a Korean government CA would have a limited root which

Re: Audit requirements for government CAs

2008-03-31 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: How stupid! If that's limited to secure government to government or citizen to government transactions, how is that limited in the software or certificate(s)? And what would its use be for the regular, typical average user? I'm not a government nor employed

Re: What we want [was: Audit requirements for government CAs]

2008-03-31 Thread Eddy Nigg (StartCom Ltd.)
First of all thank you for your reply! I understand that each such mail is an effort and consumes time (know it from myself). I appreciate it! Frank Hecker: It's a secondary point, but I don't automatically accept the proposition that CA practices have gotten much worse since we originally

Re: What we want [was: Audit requirements for government CAs]

2008-03-30 Thread Eddy Nigg (StartCom Ltd.)
And in continuation to the other posts I made: - Do we require an audit in the Mozilla CA policy because we want to have a third party confirmation about the CAs infrastructure and full implementation of its policies or do we require an audit just for its sake? - Do we require minimal

Re: What we want [was: Audit requirements for government CAs]

2008-03-30 Thread Eddy Nigg (StartCom Ltd.)
Kyle Hamilton: I want a user interface which allows me -- at a minimum -- to see what CA signed a given certificate, how that CA is in my store (whether it was provided by Mozilla or the administrator or through my own action), the subject of the certificate, and the validity period of the

Re: Audit requirements for government CAs

2008-03-30 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: Microsoft has taken an interesting approach to this problem, one that I think is worth discussing: [F]or government CAs who issue certificates to secure government to government or citizen to government transactions, Microsoft will accept a statement from a government or

Re: What we want [was: Audit requirements for government CAs]

2008-03-30 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: But our Mozilla policy hasn't kept pace with the developments of the CA industry and that of its browser, except the addition of the EV criteria. Effectively the Mozilla CA policy remained static since its introduction, which is perhaps desirable (that a

What we want [was: Audit requirements for government CAs]

2008-03-29 Thread Eddy Nigg (StartCom Ltd.)
I've seen during the last two years, serious work is basically non-existent). I came to the decision to write this mail and raise these questions, because I felt it somewhat pointless to provide my expertise upon the mail from Frank with the title Audit requirements for government CAs, without

Audit requirements for government CAs

2008-03-28 Thread Frank Hecker
As I implied in my previous message about the KISA request for inclusion of its roots, government CAs can pose special problems in the context of our current Mozilla CA policy, and I wanted to take the opportunity to discuss the topic briefly, since we may want to consider future changes to