RE: Logotypes in certificates
Michael Zolotarev <michael.zolotarev@baltimore.com> Thu, 22 March 2001 18:59 UTC
Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with SMTP id NAA17674 for <pkix-archive@odin.ietf.org>; Thu, 22 Mar 2001 13:59:02 -0500 (EST)
Received: from localhost (daemon@localhost) by above.proper.com (8.9.3/8.9.3) with SMTP id KAA14285; Thu, 22 Mar 2001 10:58:21 -0800 (PST)
Received: by mail.imc.org (bulk_mailer v1.12); Thu, 22 Mar 2001 10:58:15 -0800
Received: from stargate.zergo.com.au (IDENT:root@stargate.zergo.com.au [203.2.208.130]) by above.proper.com (8.9.3/8.9.3) with ESMTP id KAA14243 for <ietf-pkix@imc.org>; Thu, 22 Mar 2001 10:58:12 -0800 (PST)
Received: from sweepau.baltimore.com.au (sweepau.zergo.com.au [10.61.2.6]) by stargate.zergo.com.au (8.9.1/8.8.7) with ESMTP id FAA02532 for <ietf-pkix@imc.org>; Fri, 23 Mar 2001 05:07:48 +1100
Received: from sydneymail1.zergo.com.au (unverified) by sweepau.baltimore.com.au (Content Technologies SMTPRS 4.2.1) with ESMTP id <T52767ba6de0a3d0206120@sweepau.baltimore.com.au>; Fri, 23 Mar 2001 05:58:53 +1100
Received: by sydneymail1.zergo.com.au with Internet Mail Service (5.5.2650.21) id <HNY7PPN4>; Fri, 23 Mar 2001 05:56:14 +1100
Message-ID: <D44EACB40164D311BEF00090274EDCCA1E740E@sydneymail1.zergo.com.au>
From: Michael Zolotarev <michael.zolotarev@baltimore.com>
To: 'Stefan Santesson' <stefan@addtrust.com>, Stephen Kent <kent@bbn.com>, Michael Zolotarev <michael.zolotarev@baltimore.com>
Cc: ietf-pkix@imc.org
Subject: RE: Logotypes in certificates
Date: Fri, 23 Mar 2001 05:56:12 +1100
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain; charset="iso-8859-1"
Precedence: bulk
List-Archive: http://www.imc.org/ietf-pkix/mail-archive/
List-ID: <ietf-pkix.imc.org>
List-Unsubscribe: mailto:ietf-pkix-request@imc.org?body=unsubscribe
Now I'm really confused. The whole problem is, as Stephen has neatly put it, that "the whole purpose of including a displayable logo is precisely an attempt by a CA to gain the trust of users". A CA requires to gain trust of a user if it is not still trusted (obviously). Which is the case when a path construction (not validation!) ended up at some self-signed CA which is not among the user's trusted roots set. This is the only case I can think of when a decision is to be made by the user, i.e. whether to trust that CA or not. I cannot think of any other situation when a CA would require to "gain the trust of users". If so, then the scope of analysis of logotype's impact is limited to path construction, not to path validation. Because, again, validation begins when the trust is already defined, and it is to late for the user to intervene. Path validation algorithm is 'silent', it does not need to present anything to the user. Therefore, presence of a logotype cannot possible affect the result of the validation, as the user is not asked about anything, or presented anything, at that stage. Consiquently, I'm failing to understand how path validation parameters and constrains can be affected by the logotypes. I guess there may be something fundamental I'm missing... Regards Michael -----Original Message----- From: Stefan Santesson [mailto:stefan@addtrust.com] Sent: Friday, March 23, 2001 4:56 AM To: Stephen Kent; Michael Zolotarev Cc: ietf-pkix@imc.org Subject: RE: Logotypes in certificates Steve, There was a suggestion during a dinner yesterday that logotypes actually could be provided as a policy qualifier. That would actually solve your problem since you could directly tie acceptance of logotypes in certificates to a particular policy. This enables you to control the path validation problem with the use of policy constraints. /Stefan At 18:21 2001-03-21 -0500, Stephen Kent wrote: >Michael, > >>Though I don't favor including logotype or reference to a logotype to a >>cert, considering it as a pure marketing trick (sorry, Stefan :), but my >>realisation was that a logotype is by no means related to the establishment >>of trust. It is 100% meant for a human eye only, and verification algorithm >>should simply ignore it, as it ingores any other proprietory extentions. If >>the verification comes up with an answer 'not validated', and the software >>prompts a user saying 'couldn't validate', and the user still makes a >>decision to trust the cert, it is an application's problem, which already >>exists now, and logotypes add no extra pitch to it. > >I think the whole purpose of including a displayable logo is precisely an >attempt by a CA to gain the trust of users, so I disagree with your >stating point. The concern I raised is not one that is addressed by your >example, i.e., my example of a "bad outcome" is a cert that carries a logo >which will be recognized by a user and thus will engender the user's >confidence, but it is contained in a cert that, while valid under our path >validation controls, has nothing to do with the entity whose logo appears >in the cert and which is displayed to the user. > >>As an extreme, if a CA considers logotypes to be anyhow harmful, it simply >>won't have a logotype in its own cert, and refuse certification of >>logotypes. > >As a CA I can refuse to certify a logo-equipped cert one layer down, but >not farther, unless we adopt a means of representing the logo that is >subject to existing controls. Tom suggested on possible means, if we put >the logo in an altname field and make it a type which can be prohibited >using nameConstraints. > >Steve This footnote confirms that this email message has been swept by MIMEsweeper for the presence of computer viruses. ----------------------------------------------------------------------------------------------------------------- The information contained in this message is confidential and is intended for the addressee(s) only. If you have received this message in error or there are any problems please notify the originator immediately. The unauthorized use, disclosure, copying or alteration of this message is strictly forbidden. Baltimore Technologies plc will not be liable for direct, special, indirect or consequential damages arising from alteration of the contents of this message by a third party or as a result of any virus being passed on. In addition, certain Marketing collateral may be added from time to time to promote Baltimore Technologies products, services, Global e-Security or appearance at trade shows and conferences. This footnote confirms that this email message has been swept by Baltimore MIMEsweeper for Content Security threats, including computer viruses.
- RE: Logotypes in certificates David Cross
- RE: Logotypes in certificates Michael Zolotarev
- Re: Logotypes in certificates Anders Rundgren
- RE: Logotypes in certificates David Cross
- RE: Logotypes in certificates Stefan Santesson
- RE: Logotypes in certificates Stefan Santesson
- Re: Logotypes in certificates Rich Salz
- RE: Logotypes in certificates Trevor Freeman
- RE: Logotypes in certificates Trevor Freeman
- RE: Logotypes in certificates Ambarish Malpani
- RE: Logotypes in certificates Trevor Freeman
- RE: Logotypes in certificates Michael Zolotarev
- Re: Logotypes in certificates Eric Murray
- RE: Logotypes in certificates Stefan Santesson
- RE: Logotypes in certificates Michael Myers
- Re: Logotypes in certificates Stefan Santesson
- RE: Logotypes in certificates Stephen Kent
- RE: Logotypes in certificates Andrew Hoag
- Re: Logotypes in certificates Dean Povey
- Re: Logotypes in certificates Dean Povey
- RE: Logotypes in certificates Tim Moses
- RE: Logotypes in certificates todd.glassey
- RE: Logotypes in certificates Stefan Santesson
- RE: Logotypes in certificates Stephen Kent
- RE: Logotypes in certificates Stefan Santesson
- Re: Logotypes in certificates Dean Povey
- Re: Logotypes in certificates Stephen Kent
- RE: Logotypes in certificates Ambarish Malpani
- RE: Logotypes in certificates Tom Gindin
- RE: Logotypes in certificates Michael Zolotarev
- Re: Logotypes in certificates Terry Hayes
- RE: Logotypes in certificates Peter Gutmann
- RE: Logotypes in certificates Hal Lockhart
- RE: Logotypes in certificates Stephen Kent
- RE: Logotypes in certificates Stephen Kent
- RE: Logotypes in certificates Stephen Kent
- RE: Logotypes in certificates David Cross
- RE: Logotypes in certificates Stefan Santesson
- RE: Logotypes in certificates Michael Zolotarev
- RE: Logotypes in certificates todd.glassey
- RE: Logotypes in certificates Trevor Freeman
- RE: Logotypes in certificates Russ Housley
- Re: Logotypes in certificates Dean Povey
- RE: Logotypes in certificates Michael Zolotarev
- RE: Logotypes in certificates Manger, James H
- RE: Logotypes in certificates Stephen Kent
- Re: Logotypes in certificates David P. Kemp
- Re: Logotypes in certificates Michael Ströder
- Re: Logotypes in certificates Dean Povey
- Re: Logotypes in certificates Michael Ströder
- Re: Logotypes in certificates Dean Povey
- Re: Logotypes in certificates Michael Ströder
- Re: Logotypes in certificates Stefan Santesson
- RE: Logotypes in certificates Bob Jueneman
- RE: Logotypes in certificates Stefan Santesson
- RE: Logotypes in certificates todd.glassey
- RE: Logotypes in certificates Stephen Kent
- Re: Logotypes in certificates Anders Rundgren
- RE: Logotypes in certificates Stefan Santesson