> Which kind of calls their credibility into question. HALF the 'CAs' in their 
> graph are from the DFN root. You can check that out for yourself, it is a 
> German CA that issues certs to higher education institutions. As has been 
> demonstrated (and agreed by the EFF people), DFN do not sign certs for key 
> signing keys they do not hold.
> 
> You can't calculate the number of CAs the way the EFF tried to. An 
> intermediate certificate does not equate to a CA. Pretending it does to 
> peddle an alternative PKI scheme calls into question their veracity.
> 
> I have tried to get members of the EFF board to look into this but they never 
> get back. Too much trouble to get it right.


OK, in order for me to correct this in the paper I need the following 
information:

1. A link to who "DFN" is.
2. A 'yes' or 'no' as to whether DFN is a root cert that browsers are shipped 
with (and details about this, like, do all 3 major browsers include DFN?)
3. A link to a paper, a blog post, or an article somewhere that describes in 
detail your side of the argument

Let me emphasize that none of this ultimately matters to the points that were 
made in the paper.

Whether the number is 600+ or 300+, it's still an insecure, broken mess.

> I was under the impression that Bitcoin was the preferred currency of 
> libertopia. It is the only one that gets mention in the mainstream press. It 
> is not clear to me how namecoin can be part of BitCoin and another currency.


I'll be happy to clear this up:

- Bitcoin is not the "market leader" of distributed DNS systems. Namecoin is.
- Namecoin and Bitcoin are designed with completely different goals in mind. 
They are not competitors.
- Namecoin is not intended to be a bitcoin replacement, nor the other way 
around. It is not like "litecoin" or any of the other bitcoin competitors, 
because it is not a competitor to bitcoin.

> Gold Age, eGold, Liberty Reserve. All the ones that were taken apart by the 
> Feds.


I'll be happy to clear this up too:

None of these are comparable to Bitcoin or Namecoin.

Neither "Gold Age", nor "eGold", nor "Liberty Reserve" were truly 
decentralized, distributed currencies.

- "Gold Age" was not a currency: https://en.wikipedia.org/wiki/Gold_Age
- eGold: Centralized currency with no "reliable user identification" (not a 
problem with Bitcoin or Namecoin)
- Liberty Reserve: Centralized currency 
https://en.wikipedia.org/wiki/Liberty_Reserve#Background

People who are standing back and scratching their heads, wondering why Bitcoin 
is still around after years of being used to purchase illegal drugs, 
murder-for-hire, and weapons (continuing to this day btw), simply don't 
understand what Bitcoin is.

> I might be a little more inclined to make an effort if you hadn't attacked me 
> as being 'fraudulent' in your opening.


Do you represent a company that sells SSL certs? It seems like you might:

During twelve years as Principal Scientist at VeriSign Inc.,

Perhaps the paper is a bit harsh (and I welcome suggestions to improve its 
language), but the critiques it levies against companies that sell SSL certs 
are completely valid:

Companies that sell SSL certificates usually claim that their certificates 
provide customers with “security.” Customers are led to believe that these 
certificates protect browser-server communication from eavesdropping and 
tampering. As elaborated in this paper, this simply isn’t true today.

I have to say, that among the cert companies websites that I looked at, 
VeriSign's homepage makes the fewest claims about the security protections it 
provides.

The words "usually claim" leaves room for exceptions. I could not find, on the 
customer-facing pages on VeriSign's site, any claims that VeriSign's SSL certs 
"protect browser-server communication from eavesdropping and tampering."

Some close calls are:

In short, when it comes to securing online transactions, safeguarding customer 
information, and protecting business reputation, you're only as safe as the 
Certificate Authority you choose.
https://www.symantec.com/ssl-certificates-advantages

Customers Gain Confidence with the Green Address Bar: Online shoppers recognize 
the green address bar as an easy and reliable way to verify the site identity 
and security.
https://www.symantec.com/verisign/ssl-certificates/secure-site-pro-ev?fid=ssl-certificates

VeriSign's SSL certificates do not provide websites with meaningful protection 
as defined in the DNSNMC paper because they cannot be securely authenticated in 
the face of a fraudulent certificate that's presented to customers by a MITM.

If your certs can simply be replaced by any of the other CAs out there, then 
*all* of the security they provide is thrown out the window.

Furthermore, because VeriSign is a random third-party, not the company that 
user's visit when they visit a site using VeriSign's certificate, the 
protection offered by that certificate is inherently inferior to a securely 
authenticated self-signed certificate.

This is simply mathematics, and not a point that's up for debate.

When trust is distributed across more parties, that trust is diluted because it 
now depends on the least secure of those parties.

Sidenote:

It seems like I was sent "to the sharks" so to speak (perhaps as a practical 
joke?).

So far almost half of the replies to this thread have come from representatives 
of SSL companies.

The hostility is therefore no surprise.

--
Please do not email me anything that you are not comfortable also sharing with 
the NSA.

On Dec 15, 2013, at 9:21 PM, Phillip Hallam-Baker <[email protected]> wrote:

> 
> 
> 
> On Sun, Dec 15, 2013 at 8:50 PM, Tao Effect <[email protected]> wrote:
>> And for someone who is accusing others of being 'fraudulent', not a good 
>> move to start off repeating figures already exposed as bogus like the oft 
>> repeated but still untrue claim of 600 CAs.
> 
> 
> I thought the EFF was a reputable source.
> 
> There has been no update or correction to their post: 
> https://www.eff.org/deeplinks/2011/10/how-secure-https-today
> 
> Which kind of calls their credibility into question. HALF the 'CAs' in their 
> graph are from the DFN root. You can check that out for yourself, it is a 
> German CA that issues certs to higher education institutions. As has been 
> demonstrated (and agreed by the EFF people), DFN do not sign certs for key 
> signing keys they do not hold.
> 
> You can't calculate the number of CAs the way the EFF tried to. An 
> intermediate certificate does not equate to a CA. Pretending it does to 
> peddle an alternative PKI scheme calls into question their veracity.
> 
> I have tried to get members of the EFF board to look into this but they never 
> get back. Too much trouble to get it right.
> 
> 
>> Tying the notary log to namecoin seems to be completely pointless to me, 
>> unless the real objective is to promote namecoin. Why hook into namecoin 
>> rather than the market leader? 
> 
> 
> What market leader?
> 
> I was under the impression that Bitcoin was the preferred currency of 
> libertopia. It is the only one that gets mention in the mainstream press. It 
> is not clear to me how namecoin can be part of BitCoin and another currency.
> 
>  
>> Given the success of the US government in shutting down eGold type schemes I 
>> am very skeptical about the stability of 'namecoin'. If we accept the 
>> purported scenarios that motivate the scheme then namecoin won't last very 
>> long.
> 
> What eGold scheme are you comparing Namecoin to?
> 
> Gold Age, eGold, Liberty Reserve. All the ones that were taken apart by the 
> Feds.
> 
>  
> Are you sure you know what you're talking about here...? ;-)
> 
> I must admit that I find the scheme completely confused and assumes that I 
> know a lot that I do not.
> 
> I might be a little more inclined to make an effort if you hadn't attacked me 
> as being 'fraudulent' in your opening.
>  
> 
> -- 
> Website: http://hallambaker.com/
> _______________________________________________
> therightkey mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/therightkey

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
therightkey mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to