Re: [therightkey] Barely-capable CAs

Rick Andrews <Rick_Andrews@symantec.com> Thu, 01 November 2012 17:08 UTC

Return-Path: <Rick_Andrews@symantec.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82AE421F8CF0 for <therightkey@ietfa.amsl.com>; Thu, 1 Nov 2012 10:08:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JDqEYxTfOnLW for <therightkey@ietfa.amsl.com>; Thu, 1 Nov 2012 10:08:20 -0700 (PDT)
Received: from ecl1mtaoutpex02.symantec.com (ecl1mtaoutpex02.symantec.com [166.98.1.210]) by ietfa.amsl.com (Postfix) with ESMTP id D6B1D21F8C72 for <therightkey@ietf.org>; Thu, 1 Nov 2012 10:08:19 -0700 (PDT)
X-AuditID: a66201d2-b7fe86d000001f43-4a-5092ac811828
Received: from ecl1mtahubpin02.ges.symantec.com (ecl1mtahubpin02.ges.symantec.com [10.48.69.202]) by ecl1mtaoutpex02.symantec.com (Symantec Brightmail Gateway out) with SMTP id 2B.AA.08003.18CA2905; Thu, 1 Nov 2012 17:08:17 +0000 (GMT)
Received: from [155.64.220.139] (helo=TUS1XCHHUBPIN03.SYMC.SYMANTEC.COM) by ecl1mtahubpin02.ges.symantec.com with esmtp (Exim 4.76) (envelope-from <Rick_Andrews@symantec.com>) id 1TTyFc-0001DT-VO; Thu, 01 Nov 2012 17:08:17 +0000
Received: from TUS1XCHEVSPIN33.SYMC.SYMANTEC.COM ([155.64.220.147]) by TUS1XCHHUBPIN03.SYMC.SYMANTEC.COM ([155.64.220.139]) with mapi; Thu, 1 Nov 2012 10:08:16 -0700
From: Rick Andrews <Rick_Andrews@symantec.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>, "therightkey@ietf.org" <therightkey@ietf.org>
Date: Thu, 01 Nov 2012 10:08:14 -0700
Thread-Topic: [therightkey] Barely-capable CAs
Thread-Index: Ac24Q6rnBZhjId8GTD6hebiSwYMWPwADrt8w
Message-ID: <544B0DD62A64C1448B2DA253C0114146069F66FC37@TUS1XCHEVSPIN33.SYMC.SYMANTEC.COM>
References: <7500672F-5BDE-4EBE-ABC3-1AFEF2972D95@vpnc.org> <70E51AD3-D937-416E-8F3C-60B6156190DC@vpnc.org> <CAMm+LwgSrwBO=cD5zQ5G1PG0YyC7gvG7cWGqhL1KhPectG6Y+w@mail.gmail.com> <DDDF8726-F491-46AB-9A4A-AFB99006A393@vpnc.org> <42F98BCB-17F8-427E-8E9D-33A04978A339@vpnc.org> <CAMm+LwihwHFYcAkJvjRe7Js9AJkS8s6ZooxJnE526UOsWHGCuw@mail.gmail.com> <A09B4DFF-936C-488C-9915-B5F9A579FA1F@vpnc.org> <CABrd9STFeAxxmFDCZMkREXyEcKbeeQbF8ZeESXcoKPnkckdZwQ@mail.gmail.com> <CAMm+Lwg6EoSy-p7US0uZtKjxGHF39iH-0mvxg-hJ+AqK4vXL-A@mail.gmail.com> <CABrd9SRa9Ye9gkjpaQ+PqQyay9NKJB__dkDwOBwPHvw16dkTRg@mail.gmail.com> <544B0DD62A64C1448B2DA253C0114146069D3FBAE8@TUS1XCHEVSPIN33.SYMC.SYMANTEC.COM> <CAOuvq22PMSq2sAmUBfJcWu6LhEdCA3jKteu38m4UuHbykp7xZw@mail.gmail.com> <544B0DD62A64C1448B2DA253C0114146069D5FC685@TUS1XCHEVSPIN33.SYMC.SYMANTEC.COM> <6DD8CB4F-1233-403D-A27E-F3F80310390F@vpnc.org> <544B0DD62A64C1448B2DA253C0114146069D5FC79B@TUS1XCHEVSPIN33.SYMC.SYMANTEC.COM> <508A48C5.9070005@comodo.com> <CABrd9S! R4y5nRm-AP6t5_HzUO+CROwh+KnVn48_9hMTFQ4A93=Q@mail.gmail.com> <544B0DD62A64C1448B2DA253C0114146069D76E5FC@TUS1XCHEVSPIN33.SYMC.SYMANTEC.COM> <CABrd9STHtw__Wm30Z5T27mx8PMb-mScCSa-EZVDdeQvy_Rru1Q@mail.gmail.com> <544B0DD62A64C1448B2DA253C0114146069F66F830@TUS1XCHEVSPIN33.SYMC.SYMANTEC.COM> <CABrd9SSJWm_8BY9uN4D6=LmogwkNeLMZtJaOX2MQU1QuCHJwyg@mail.gmail.com> <80A8F0DC-C894-4299-AEC7-12B84A803E84@vpnc.org>
In-Reply-To: <80A8F0DC-C894-4299-AEC7-12B84A803E84@vpnc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprIIsWRmVeSWpSXmKPExsXCZeB6SrdxzaQAg9mLeCxurf/CavHxwk8W ByaPJUt+Mnl8nn2VOYApissmJTUnsyy1SN8ugSvjwuaJjAU/eCt2Pn3C0sDYzt3FyMkhIWAi sfzCZhYIW0ziwr31bF2MXBxCAu8YJSa3nmWFcF4xSpxqvwBWJSSwklHi0NJkEJtNQE9iy+Mr 7CC2iECkxOOZF5lAbBYBFYmt16aAxYUFdCUm7DzEBFGjJ/FnzxIWCNtI4tb/A2A1vAJREpcW djNBLJvLLTFx+VZGkASngI3EuhNNYEWMQOd9P7UGbBCzgLjErSfzmSDOFpBYsuc8M4QtKvHy 8T9WiHpRiTvt6xkh6nUkFuz+xAZha0ssW/iaGWKxoMTJmU9YJjCKzUIydhaSlllIWmYhaVnA yLKKUSY1OccwtyQxv7SkILXCwEivuDI3ERhNyXrJ+bmbGIERtSyJ8dIOxvuHdQ8xCnAwKvHw bmmfFCDEmlgGVHmIUYKDWUmE9/gKoBBvSmJlVWpRfnxRaU5q8SFGaQ4WJXHe26VRAUIC6Ykl qdmpqQWpRTBZJg5OqQZGfafkMH2hmieGPAe2r/apFn9z6F+JEvPrrx9tT8gVPVzfsnfXuqv1 Wnu2vU2dkXRGMiLHNENLOd5qzhHz3cKzZp76rhh54dWmfWv9X4fnuvvebDNnjXx58eeyLMa7 EWapfbaKu3dbNvm/DVpwjE/6i8WXb/3x19+2GO4obed+9Oy+rHYXt6KQEktxRqKhFnNRcSIA IInggqQCAAA=
Subject: Re: [therightkey] Barely-capable CAs
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>, <mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>, <mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Nov 2012 17:08:20 -0000

> -----Original Message-----
> From: therightkey-bounces@ietf.org [mailto:therightkey-
> bounces@ietf.org] On Behalf Of Paul Hoffman
> Sent: Thursday, November 01, 2012 8:15 AM
> To: therightkey@ietf.org
> Subject: [therightkey] Barely-capable CAs
> 
> On Nov 1, 2012, at 2:10 AM, Ben Laurie <benl@google.com> wrote:
> 
> > Its only software. The process of participating in CT for a server
> operator is:
> >
> > 1. Run command line tool once, giving it your certificate as input
> and
> > an SCT file as output.
> >
> > 2. Add one line of configuration to your server config.
> >
> > Not exactly rocket science. If people _really_ find it hard, we could
> > build it into the servers so there was no manual step at all.
> 
> As someone who has to trust every CA in the root pile in my browsers
> and OSs, I find it frightening that a CA who can say "this is your
> bank's certificate" cannot handle new requirements for how to say that.
> If adopting a simple protocol like this causes an ossified CA too many
> problems, maybe I don't trust that CA to be able to issue certificates
> for my bank, much less to be able to know which certificates that they
> are actually issuing.

Paul, I find your statements to be oversimplifications:

1) That the CT protocol is simple: I've been trying to make the point on this list that it may be conceptually simple but pretty difficult to implement to the scale that is required.

2) That CAs can't handle new requirements: I'm not convinced that CT is the silver bullet that some appear to claim it is. If you were referring to my statements on this list, please don't interpret my criticism as inability to handle new requirements. I think a debate on the merits is healthy.

-Rick