[OpenID] Rule of thumb

Eddy Nigg (StartCom Ltd.) eddy_nigg at startcom.org
Fri Jul 13 16:42:37 UTC 2007


Hi John,

John Wang wrote:
> On 7/13/07, *Eddy Nigg (StartCom Ltd.)* <eddy_nigg at startcom.org 
> <mailto:eddy_nigg at startcom.org>> wrote:
>
>     Yes, there is something wrong with it and you should ask yourself,
>     why CAcert isn't in any browser at all....just ask the Mozilla
>     folks about it...If you need digital certification for
>     low-assurance and encryption purpose only you can get them for
>     free from StartCom: http://cert.startcom.org/ (Class 1, one year
>     valid).
>
>
> Thanks for mentioning StartCom, Eddy. I haven't looked at TLS/SSL 
> certs in a while, this is new and welcome to me.
I thought that to be already common knowledge ;-)
> As for why CAcert isn't a browser, I figured there was an artificial 
> linkage between encryption and trust in TLS/SSL that doesn't need to 
> be there, except that's how the technology and user acceptance 
> matured. I'm not sure whether the issue is more that CAcert is doing 
> something wrong or that TLS/SSL matured differently than it could 
> have. A hypothetical question is whether it's wrong to have the 
> browser pre-trust any CA for their users?
Most browsers have very similar conditions for shipping a certain CA 
root in their software by default. You might have a look at 
http://www.mozilla.org/projects/security/certs/policy/ in order to 
understand what they are (very reasonable and not too difficult to 
understand). Now CAcert, as a community driven web-of-trust scheme "CA", 
can't meet the basic requirements. In that respect a user should judge 
carefully if he wants to trust a certain CA - which isn't something 
everyone browsing the Internet can really understand without an 
investment in time and certain knowledge. But CAs built into the browser 
(and other software) meet the requirements put forward by the software 
vendor. Most likely that for most users, these checks and conditions put 
forward by the software vendor are sufficient!
>
> I haven't looked into Mozilla's specific reasons for excluding CAcert 
> but assuming the reason can be generalized, if there is something 
> wrong with CAcert, then could the same reasoning be used for many IDPs?
Yes, I think so! This is one of the things I suggested many times 
already, so I don't think that IDPs have to meet the same requirements 
as for CAs. But certainly the relying party (in the OpenID world the web 
site operators of Forums, Blogs etc.) needs to be sure, that the IDPs he 
wants to trust conform to a minimal standard and basic requirements (of 
operation). David from Verisign suggested, that "some" third party 
organizations will perform these services (as for example Webtrust does 
for CAs), however I'd certainly prefer that to be something which would 
come from the OpenID community itself. Or in other words, I think some 
of us should come together and found/operate this service. This perhaps 
would allow most sincere IDP operators to perform and provide their 
service as OpenID providers, only shutting out the ones which would be 
used for spam and other fraudulent use.

-- 
Regards
 
Signer:      Eddy Nigg, StartCom Ltd.
Jabber:      startcom at startcom.org
Phone:       +1.213.341.0390
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20070713/6b7fd9af/attachment-0002.htm>


More information about the general mailing list