1995-08-23 - Re: Certificates/Anonymity/Policy/True Names

Header Data

From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
To: Michael Froomkin <mfroomki@umiami.ir.miami.edu>
Message Hash: f41a1d9ec194a2b370497997d19278e26b453621425de9c6e0e16a9e2dcd5d9a
Message ID: <9508231630.AA01613@ch1d157nwk>
Reply To: N/A
UTC Datetime: 1995-08-23 16:31:04 UTC
Raw Date: Wed, 23 Aug 95 09:31:04 PDT

Raw message

From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
Date: Wed, 23 Aug 95 09:31:04 PDT
To: Michael Froomkin <mfroomki@umiami.ir.miami.edu>
Subject: Re: Certificates/Anonymity/Policy/True Names
Message-ID: <9508231630.AA01613@ch1d157nwk>
MIME-Version: 1.0
Content-Type: text/plain


Michael Froomkin writes:
[...hypothetical screwups by CA leading to lawsuits snipped...]
>  Since (in the absence of any rules given the newness of the
>  technology) it is very likely that a rich CA would get nuisance
>  suits every time a deal in which it particiapted went sour, the
>  absence of rules will either raise costs CAs have to charge (e.g.
>  to buy insurance) or will keep rich folk out of the industry (which
>  isn't good either, since you want CAs to buy security and to last).
>  Thus the need for clear liability rules.

What about when the CA signing key is stolen, factored, or otherwise falls  
into the wrong hands, thereby possibly making every signature made by the CA  
worthless, or at least questionable?

I assume liability will be based on the CA's efforts to ensure the integrity  
of the signatures it makes (and therefore the confidentiality of the secret  
key components), but what constitutes due diligence?  As we all know,  
security measures cover a very wide range and can reach ridiculous  
proportions on both ends of the spectrum...  How much security will be  
'enough' from a legal standpoint...?


andrew





Thread