David Schwartz wrote:
>  And with respect to the other thread, I agree with you. The level of 
> security should be the highest that doesn't require sacrificing things that 
> are more important than security. Sometimes all you need is to keep out your 
> kid sister, sometimes you have to keep out professional spies financed by a 
> major government. The solutions appropriate to those two extremes are very 
> different. Don't let the fact that you can't feasibly implement a perfect 
> solution keep you from implementing one that is more than good enough.

X.509 was written to support SET (Secure Electronic Transactions), and
standardize the things that SET needed.  X.509 wasn't appropriate to
the Internet, and that's why the "Internet Profile" (PKIX) was issued.

Unfortunately, the people who wrote the PKIX were people trying to
make the protocol have the things that the financial
services/fiduciary communities needed.  Many of the things in there
just do not apply to the things that general users of the Internet use
the Internet for.

The cryptographic security folks are so overwhelmingly pedantic to
"absolute measures of security" that they forget the concepts of
"relative security" and "usability".  (Case in point: browsers treat a
'cannot verify certificate' as a complete failure mode, requiring a
modal interaction, instead of allowing the page to show up with a
pop-up or balloon tip that says "we don't know who this is, the
certificate says this, and it's issued by that, and we don't have any
guidance on whether to trust that or not".  This is particularly
annoying when trying to, say, browse an svn server that has a
self-signed cert.)

Rather than including lists of "approved certificates" and relying on
them as though they're Holy Writ, I think the direction that needs to
be taken is one where inability to chain to a 'trusted' root is a
common occurrence.  My case for this is basically that web forums
exist on their own recognizance, and users create accounts on them,
sharing personal information, without any cryptography whatsoever (and
thus, without any assurance of identity whatsoever).  Users should not
be penalized with modal dialogs and security warnings that jar them
out of their browsing mindspace just because they want to make sure
that the information they have isn't eavesdropped along the way to the
site.

Besides.  If web forums get to the point where they can set up their
own CAs (self-signed certificates), then they can also issue identity
credentials for the user accounts they manage -- say (for example)
that I have [EMAIL PROTECTED], Google could issue me a certificate
for '[EMAIL PROTECTED]' to prove that I actually do have the Google
account no matter what medium I'm communicating over.  This would
allow me to use this identity for IMing on networks other than Jabber.

I also have 'aerowolf' on a few other boards.  If I want to
communicate with people who are also part of those boards' communities
in places other than those boards, I should be able to (for example,
to prove my identity to an IRC server, or a DCC chat).  The upside for
those boards?  increase communication between members without
increasing storage and network costs.  The downside?  Fear of the CA
Policy Document.

There are a lot of issues that need to be ironed out in this idea, but
I've been working on it for the past couple years.  I'm just sick of
having this wonderful and interoperable toolset available, and nobody
using it because they're all terrified of "additional liability" and
"huge amounts of work".  Not to mention "lack of client support",
"lack of useful mappings to everyday internet usage concepts", and
"lack of motivation to change the unencrypted status quo".  There was
more activity in the months leading up to the potential imposition of
the Clipper Chip than there has been since -- because the threat to
cryptography is no longer perceived.

-Kyle H
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to