1996-07-19 - Re: Reasonable validation of a software package

Header Data

From: David Sternlight <david@sternlight.com>
To: Carl Ellison <froomkin@law.miami.edu>
Message Hash: 9feacc5d4b53001cf79f6a4b4c100c414dbe9a4775ff2f7a70cfa72039987252
Message ID: <v03007604ae1507913f38@[192.187.162.15]>
Reply To: <199607170728.AAA29471@comsec.com>
UTC Datetime: 1996-07-19 12:57:04 UTC
Raw Date: Fri, 19 Jul 1996 20:57:04 +0800

Raw message

From: David Sternlight <david@sternlight.com>
Date: Fri, 19 Jul 1996 20:57:04 +0800
To: Carl Ellison <froomkin@law.miami.edu>
Subject: Re: Reasonable validation of a software package
In-Reply-To: <199607170728.AAA29471@comsec.com>
Message-ID: <v03007604ae1507913f38@[192.187.162.15]>
MIME-Version: 1.0
Content-Type: text/plain


At 1:12 PM -0700 7/18/96, Carl Ellison wrote:

>
>The problem people overlook is that a CA binds a public key to a name but
>the name is in the CA's name space.  For me, a verifier, to derive any
>value from a certificate binding (key,name), the name has to be in *my*
>name space.
>
>If there were such a thing as a global namespace meaningful to everyone,
>then we could both use it.  That's the X.500 falacy/pipe-dream.

Think of the common name on a certificate as if it were a first-come,
first-served serial number of alphanumeric form. There's no reason to
believe that John Smith is YOUR John Smith. Your John Smith might tell you
he's John Smith 37. It's kinda like vanity license plates.

The alternative is every privacy fan's nightmare--embedded SSNs or some
such in certificates.

Some of the problems, of course, will be of the users' own making and there
they get to pay their money and take their choice. What I mean is that you
can optionally include or suppress your e-mail address in Type I
certificates, and real address in Type IIs. If you include it you improve
the chances of being the "right" John Smith someone is after. If you prefer
privacy you will also be less accessible. I see nothing unusual about
that--after all, people with unlisted phone numbers are ultimately
inaccessible except (pretty much) to those to whom they give the info.

>
>The fact is, no global name space could be held in one human's mind, so
>there's no way a global name space could be meaningful to me.

Nor is there any reason it should be. It isn't, now.

>
>So, to use a certificate from a CA, I need to map a name from its name
>space (DN) into a name in my name space (nickname).  Every time I've looked
>at that process, I've had to have a secure channel over which to learn from
>the person I call by that nickname what DN he goes by.

Why does it have to be a secure channel? Why can't it be published (for
instance by including the address in the certificate)?

>If I have that
>secure channel, then he could tell me his public key fingerprint ove that
>cnnel -- and I wouldn't need the CA.

Why wouldn't you use the certificate to bind the public key to the name and
address? What need would there be for fingerprint communication?

How is this different from 20 John Smiths in the phone book at 20 different
street addresses? I'd better know the address of the John Smith I want if
I'm to get his phone number from a directory.

Note that I'm not attacking what you say. There's clearly something you're
getting at that I don't understand--since you post sensible stuff (as far
as I recall). Help me out here.

David







Thread