Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Encryption Security

Is It Time For an Open Source Certificate Authority? 219

cagnol writes "So far there are three free ways to get a free certificate to sign your email and receive encrypted communications: Thawte, Comodo and CAcert. Thawte's root certificate is in mainstream browsers. Thawte's interface is good and the web of trust allows for increased security by verifying people's identity. However Thawte is not open-source; worse: it is owned by VeriSign. Comodo's root certificate is in mainstream browsers too but there is no web of trust and their forms are not always working. CAcert is the closest to an open-source certificate authority but is not open-source and it seems that parts of the system are shaky. CAcert provides a web of trust. Unfortunately, CAcert's root certificate is not in mainstream browsers. Don't you think it is time for a true open-source certificate authority? Should this community be related to the Mozilla Foundation and comply, since day one, with the requirements to get a root certificate in Firefox?"
This discussion has been archived. No new comments can be posted.

Is It Time For an Open Source Certificate Authority?

Comments Filter:
  • by Ckwop ( 707653 ) * on Sunday April 29, 2007 @10:31AM (#18918531) Homepage

    I've fell out of love with public-key signature schemes as a means of proving authenticity. There are a few problems with the idea in general:

    1. Nobody actually reads the certificates.
    2. Even if they did, they don't really mean anything anyway. How difficult is it to get a real certificate with fake credentials?
    3. Moreover, if the URL is similar enough to the target of your phish then your SSL certifcate may well be legitmate in every sense of the word but you trick people because the URL is close enough to a big brand's main domain.

    I think Zimmerman, with his ZPhone program, has got it right. Really, all you're interested in for E-mail or VoIP is not whether the person really is Simon Johnson, of Widnes, based in the United Kingdom who is 23 years old with a pet dog called Thornton. You're actually interested in whether this Ckwop guy I'm speaking to now is the same guy as I spoke to last-time.

    When you weaken your security requirement to this position, you can remove a staggering amount of complexity. You can cut out all the CAs, all the X.509 certificates and ASN.1 implementations etc. What you're left with is Diffie-Helman and AES in CCM mode. You can implement this in a couple of thousand lines of provably correct code and your done.

    The real way to solve the "identification problem" with web-sites is to change the way credit-cards work. You have a secure token that outputs a different string every thirty seconds. RSA have made these but they're very expensive for no explicable reason, the banks would develop an open-standard in my model to drive down prices. When you pay for something, you submit your credit-card along with the token's value. The transaction will only be authorised if the token's value matches what the bank thinks that value should be.

    That way, phishers only have one shot to take your money. Sure, they could make a mock payment page but the auth-code is only going to work once. I think this would destroy the cost effectiveness of phishing for credit-card numbers. That said, identity theft would still be an issue.

    Simon

    • Re: (Score:3, Informative)

      by Anonymous Coward
      That is incidentially how SSH authentication works. The host key is cached along with the host name, so if it is different the next time you connect, you'll get a big warning.
    • by Workaphobia ( 931620 ) on Sunday April 29, 2007 @11:11AM (#18918773) Journal
      Credit cards simply should not work based on knowledge of a stupid number. Change the system so that every transaction is authorized through a direct communication between the cardholder and credit card company, and you've eliminated the danger of not knowing which merchants to trust with a common number.
      • the point of having the card in the first place then? Maybe I'm mistaking your suggestion for something else, but what role exactly is the actual card playing here?
        • Re: (Score:3, Informative)

          by Workaphobia ( 931620 )
          None. The card's just an artifact of the past. Under the current system even, there's no reason to have a card in internet shopping if you have your number and security code written down on a piece of paper.
      • by Old Wolf ( 56093 )
        Change the system so that every transaction is authorized through a direct communication between the cardholder and credit card company, and you've eliminated the danger of not knowing which merchants to trust with a common number.

        But then Catherine Zeta-Jones can't use her Visa to buy bananas off monkeys!
      • SET failed, and now we have Verified by VISA, which I refuse to sign up for because it imposes extra work on me for no benefit. I'm not eager to try this idea a third time.
      • Credit cards simply should not work based on knowledge of a stupid number.

        Few people would argue with that idea.

        Change the system so that every transaction is authorized through a direct communication between the cardholder and credit card company, and you've eliminated the danger of not knowing which merchants to trust with a common number.

        That is underway, in Europe they already use smartcards for credit card transactions. Getting that to happen in the US is a major problem because there are 10,00


    • Two points.

      1) To be a cert authority, don't you need at least a medium-sized farm of supercomputers to mine very large prime numbers [<=, say, 2^4096] from the greater ether [wikipedia.org] of non-primes? And ain't that gonna require some pretty serious investment $$$'s?

      2) A little off-topic, but what happens in RSA [wikipedia.org] if you cheat, and use non-primes as your keys? [Often the math will still work, but sometimes it won't - and what goes wrong if it doesn't?]
      • To be a cert authority, don't you need at least a medium-sized farm of supercomputers to mine very large prime numbers [

        A CA doesn't need to generate a lot of primes, it needs to generate two. The product of these is then the public key. A CA only really needs a single certificate (a certificate is a public key and some data about the owner, signed by the private key). This is then used to sign the ones their customers provide. OpenSSL includes everything you need in order to be a CA. You generate your public and private key pair with it, your customers can generate theirs and the certificate signing requests, and you can sign their certificates with it.

        Having the CA generate your certificates would be a very bad idea. At no point should your CA (or anyone else) have access to your private key. Roughly speaking, a CA works by having providing customers with some data that can be attached to the certificate (and including a hash of the certificate) that is encrypted using the CA's private key. Someone downloading the certificate who has the CA's certificate can use the public key from that to decrypt the signature from the certificate, and verify that the CA believes that the certificate is valid.

        A little off-topic, but what happens in RSA if you cheat, and use non-primes as your keys?

        Then you get nonsense out. RSA is based on modulo arithmetic and only works correctly if you have no common factors. For certain messages, you could create non-prime keys that would work, but it would be a lot more effort to find them. The only keys that work for all messages are primes.

      • by fwr ( 69372 )

        1) To be a cert authority, don't you need at least a medium-sized farm of supercomputers to mine very large prime numbers [&#140

        No. If you're unaware of how CA's work, they just sign certificates. That's their primary purpose. The end-user or RA may generate the certificate that the CA signs. Or you may have the CA generate the certificate for the user. Or the CA can download a small applet and have the end-user do the work as far as generating the keys. However, the preferred method is to have t

    • Re: (Score:3, Insightful)

      by kestasjk ( 933987 )

      Nobody actually reads the certificates.

      Nobody has to if you trust the certificate authority. What use is reading it anyway, if it hasn't been signed by a CA/friend and can be tampered with?

      Even if they did, they don't really mean anything anyway. How difficult is it to get a real certificate with fake credentials?

      If a CA is worth its salt, nigh on impossible; that's what you pay those ridiculous prices for (at least, that's where the money should go). This is the main problem with an open CA; there are presumably fewer security checks that the person requesting the certificate is who he says he is.

      Moreover, if the URL is similar enough to the target of your phish then your SSL certifcate may well be legitmate in every sense of the word but you trick people because the URL is close enough to a big brand's main domain.

      That's a phishing problem, not a crypto problem.

      I think Zimmerman, with his ZPhone program, has got it right. Really, all you're interested in for E-mail or VoIP is not whether the person really is Simon Johnson, of Widnes, based in the United Kingdom who is 23 years old with a pet dog called Thornton. You're actually interested in whether this Ckwop guy I'm speaking to now is the same guy as I spoke to last-time.

      This is exactly what

    • Really, all you're interested in for E-mail or VoIP is not whether the person really is Simon Johnson, of Widnes, based in the United Kingdom who is 23 years old with a pet dog called Thornton. You're actually interested in whether this Ckwop guy I'm speaking to now is the same guy as I spoke to last-time.

      What I am really interested in is whether or not the person I am talking with is real and accountable. I do not want to talk with some ficticious identity multiple times, as Zimmerman would proffer as

    • Re: (Score:3, Informative)

      by bcrowell ( 177657 )
      You're actually interested in whether this Ckwop guy I'm speaking to now is the same guy as I spoke to last-time. [...] When you weaken your security requirement to this position, you can remove a staggering amount of complexity.
      A couple more reasons why a free certification authority is not as useful or feasible as one might think:
      1. The traditional service is useless unless someone is going to check on the real-world credentials of the person applying for a certificate. That means there have to be offic
    • Re: (Score:3, Insightful)

      by iabervon ( 1971 )
      Public-key crypto is still useful so that people can have a certificate that they keep really secure which signs certificates that they carry around and use. Furthermore, it's useful for cases where you want to know what somebody else thinks: this really is "that site that my friend recommended" or "a company known to the state of California". The problem isn't PKI, it's the notion that (1) signatures without assertions mean something, (2) "authenticated" without a user-meaningful identity means something,
    • "1: # Nobody actually reads the certificates."

      Actually, I do, and it only takes one person to catch a bad certificate.

      "2: Even if they did, they don't really mean anything anyway. How difficult is it to get a real certificate with fake credentials?"

      Not too difficult. There is some checking if you are a real person, so they may be able to track you down, and you need to pay some money. I won't get one for "betalen.rabobank.nl" though, which is my banking site. They probably would check if the domain has alr
  • In reality... (Score:5, Insightful)

    by tomstdenis ( 446163 ) <tomstdenis@gma[ ]com ['il.' in gap]> on Sunday April 29, 2007 @10:31AM (#18918533) Homepage
    They shouldn't be issued by private corporations but instead by the man who issues the business licenses. Otherwise, it's meaningless. So I setup p4ypal.com, buy a cert and trick people to go there. Whoopy.

    What do certs really mean anyways? Just because company.com has a legit cert from verisign doesn't mean they're a good company. It means that I'm talking with company.com. Big deal.

    Tom
    • Certificate Authority:
      secretaryofstate.state.us or departmentofcommerce.state.us
      you should recognize who it is

      Far more paperwork and verification is done to incorporate (business licenses.) They have to commit tougher crimes to sneak off with a corporation or LLC. You have multiple parties interested such as the IRS and secretary of state who look bad if dummy corps are floating around (you don't mess with the IRS gangsters.)

      Certs allow for multiple signings if I'm remembering correctly. There is no reason
    • Re: (Score:3, Informative)

      by pjt33 ( 739471 )
      Why should certificates be tied to business licences? You don't have to be a business to want to use SSL with your website.
    • by DrSkwid ( 118965 )
      When I connect to my mail via SSL on a public network, I want to have a means of 1) verifying the endpoints and 2) encrypting the traffic.

      Knowing that you're connected to company.com *is* a big deal because you're about to send your some sensitive info.
  • by grahammm ( 9083 ) * <graham@gmurray.org.uk> on Sunday April 29, 2007 @10:32AM (#18918539)
    All of the current CAs seem to over emphasise the use of certificates for https servers and e-commerce. Their web sites mention this usage almost exclusively and if other uses of certificates are mentioned they are hidden away.

    So if an open source CA is set up, it would be good for it to give more prominence to other uses of certificates, such as S/MIME, starttls for mail servers, for VPN authentication etc.
    • by TheRaven64 ( 641858 ) on Sunday April 29, 2007 @11:16AM (#18918807) Journal
      I use a CACert certificate on a couple of mail servers, for outbound SMTP and inbound POP/IMAP. If I need to re-create the certificate, none of the users has to know anything about it, as long as they added the CACert root to their client; the old and new ones are both signed by the same root, and so it just works.

      I don't really understand what the original poster meant by saying CACert is not open source. Open source doesn't really apply to something like a certificate authority, because they are not providing software. Anyone can get a CACert certificate at no cost. All you have to do is show two forms of government-issued ID (one with a photo) to an existing member. The more people who assure you in this way, the better the certificate you can get, and eventually you are allowed to start assuring people yourself. The problems I see with CACert are:

      1. There is not yet a good infrastructure for assuring organisations. Non-profits would benefit a lot from this kind of thing.
      2. There is no good revocation mechanism, nor a good verification mechanism. The points A gets from being assured by B and C are the same, even if C was assured by B. It would be better if you had to be assured by people from divergent branches of the tree.
      3. Due to the way IE handles root CAs (i.e. pay lots of money), it is not likely to get in there for a very long time.
      • by crush ( 19364 )

        I don't really understand what the original poster meant by saying CACert is not open source.

        Well this [cacert.org] is the license, and it seems to not allow us to modify and redistribute the source.

        • I hadn't seen that, but now that I have, I am still not convinced it matters. It's like asking if we need an open source search engine. Whether the CA uses open source software or not makes no difference. We aren't lacking open source software to allow people to run their own CA (it comes with OpenSSL, found on most *NIX systems). The software used by a CA is completely irrelevant to the service it provides, which is a method of verifying someone's identity.

          A completely open source CA would allow red

      • Due to the way IE handles root CAs (i.e. pay lots of money), it is not likely to get in there for a very long time.

        Microsoft no longer charge for including a root. Instead they require a CA to have a WebTrust audit. That can run to a hundred thousand dollars.

        The issue that keeps comming up here is that people want to do encryption without a CA. Thats fine, the CA infrastructure was designed to support authentication, not encryption. If you are not concerned about a man in the middle attack you do not n

  • by smallpaul ( 65919 ) <paul @ p r e s c o d . net> on Sunday April 29, 2007 @10:32AM (#18918543)
    The question posed is "Is it Time for an Open Source Certificate Authority?" But the description does not address the question. Rather it addresses the question of whether there is an open source certificate authority. First: someone needs to define what it means for a service to be "open source". Second, they need to describe why anyone should care whether a service is open source. That would be a better start to the dicussion than a laundry list of certificate providers.
  • by wizman ( 116087 ) on Sunday April 29, 2007 @10:36AM (#18918563)
    Having an open source CA is one thing. Having the root certificate included in major browsers is an expensive endeavor. The www.cacert.org site has an FAQ entry about this:

    http://wiki.cacert.org/wiki/InclusionStatus [cacert.org]

    Summary: Lots of open source browsers already have the cert; Mozilla/Firefox will have it soon. Internet Explorer (and apparently Apple's Safari) won't have it unless they come up with a way to pay for the $75,000+ plus $10,000 a year for a AICPA WebTrust audit.
  • by Anonymous Coward on Sunday April 29, 2007 @10:43AM (#18918599)
    I've been saying for years that security certificates are a scam. Everybody knows it's a meaningless number. You can write your own security certificates. With the choice between paying $100s to some shady "security company" or generating your own for free what would you choose? Face it, certificates are another barrier to trade and security compaies are greedy mafia and nothing more. How can Thwarte or Verisign or whatever be at the root of a "web of trust"? Trust from whom. Not from me. And if I'm writing the system who gets to say what is and isn't trust? From the uend users perspective, the only person that matters, they never heard of Twarte or Verisign. How would they know a certificate from those companies from another you made up with an impressive sounding company name like UltraSecure or SafeClick? It's a meaningless game. And it's not like this "trust" gives any party some legal recourse or adds accountability to the operator. Yep, Open source certificates all the way. Anyone can set up a verification system selling zero cost numbers to strangers if they sign a form or show their driving licence or something, but it wont make anybody or anything more secure.

    • Re: (Score:2, Insightful)

      by tepples ( 727027 )

      You can write your own security certificates. With the choice between paying $100s to some shady "security company" or generating your own for free what would you choose?
      If you generate your own certificate, how do you 1. convince end users to install your certificate and 2. teach end users how to install your certificate?
    • Re: (Score:3, Insightful)

      by mollymoo ( 202721 )

      I've been saying for years that security certificates are a scam. Everybody knows it's a meaningless number. You can write your own security certificates. With the choice between paying $100s to some shady "security company" or generating your own for free what would you choose?

      Everybody knows it's a meaningless number? Your grandma knows that, does she? Very few people know anything about certificates at all. All they know is that if they go to Amazon's secure pages, a little padlock appears and they've

    • The certificate system isn't completely usesless -- There's a paper trail linking a certificate to a bank/credit card account.

      If someone buys a certificate, you can conduct an investigation and trace it back to the person who made the purchase, and from there to the authorizaer. If you buy some sort of Verisign cert with a stolen credit card, they'll revoke the cert once the chargeback comes through the CC.

      An open-source CA doesn't make sense, as you cannot enforce the security standards.
      • It's even more than that, it links a certain IP address (you have to have a fixed IP), a certain registered domain to a specific business bank account. And in many places, you can't get that bank account without at least registering with a local bank. A typo domain spoof of a secure domain is possible, but I question why someone would go to that length. Getting registered also means that you get into the browser by default. If the browser spits out a nasty warning, a lot of users would go away, so any
      • Verisign may well revoke it, but do any browsers pay attention to revocation lists?
        Besides, if you were being fraudulent you'd have probably moved on by the time the chargeback goes through.

        I think you would have a very difficult time using registration details to track down someone interested in fraud, they don't tell you that a business is trustworthy.
        Certificates are only really meaningful when you already have some trust in the business in question, such as your bank or some other big name.
    • by Gwala ( 309968 )
      Protip: Self-Signed Certificates are worthless.

      Hypothetical: I hijack your DNS and point your servers IP at my faux-server. For this example, I'll call those 'original', and 'fake'.

      You have a self signed certificated issued to by . Since I now control that domain, I can issue a certificate with those same details to myself. Because it's being issued by the same authority, there's no steps required to take those names or assumptions.

      This same attack can be performed using a man-in-the-middle on the connecti
    • Can somebody *please* mod this down? First of all, a certificate is not a number. You can write your own certificates, but they won't be trusted by any browsers. The end user does indeed not know about trusted third parties (TTP's) as they are called, but as long as the browsers do, they don't need to. "UltraSecure" and "SafeClick" are not part of the browsers trusted certificate store, and the browsers will rase hell if you try and authenticate with root certificates with that name. And, as another user no
  • We already have (Score:5, Insightful)

    by Watson Ladd ( 955755 ) on Sunday April 29, 2007 @10:49AM (#18918643)
    It's called GPG. It can be used with TLS as GNU TLS demonstrates. The one issue is making sure that GPG/TLS is implemented more widely.
  • by badzilla ( 50355 ) <ultrak3wlNO@SPAMgmail.com> on Sunday April 29, 2007 @10:49AM (#18918651)
    It's already possible to get SSL server certificates for a few dollars; these "work" in the sense of not triggering scary browser messages but are essentially worthless in the sense that they do not provide any further positive identification of site ownership. Unfortunately it's hard to see how anything "open source" could improve on this, unless the open source CA were willing to provide background-checking services for free.

    It's also already possible to get high quality free/beer personal identification certificates for example the Thawte Web Of Trust who issue personal certs based on real-world check of national ID such as passport.

    What we really need from an open CA is something you cannot to my knowledge get elsewhere which is reliable code-signing certificates without spending hundreds of dollars.

    • by crush ( 19364 )

      CAcert also offers free, personal certificates based exclusively on WoT checking, and Class3 certificates for code-signing, it's similar to Thawte's model except for the free Class3 certificates [cacert.org].

      The big hurdle seems to be that the Mozilla Foundation won't include the CAcert root certificate in the browser because CAcert doesn't pay them (unlike all the other root authorities).

    • GPG is used daily to sign releases and histories and patches on several revision control systems. I guess you mean signing for runtime loading like in ACS. When patches signing with GPG was implemented in GNU Arch, I remember someone said on the mailing list: "I'd rather have a key signed by Manoj [debian.org] than one signed by the pope". I think that this represent well how decentralized trust (GPG, PGP) compares with centralized trust (SSL). Centralized trust works if you trust the CA. But, being the CA gives yo
  • Why OpenSource? (Score:2, Interesting)

    by cybrangl ( 621520 )
    Right now there are plenty of free certificate authority programs out there. The only difference is that the authorities are not trusted by the browsers. If you could have every authority trusted, the certificates would mean even less than they do now. All we really need to do is take the methodology CAcert uses and add their authority to the browsers.
  • Awesome! (Score:5, Funny)

    by 222 ( 551054 ) <stormseeker@gma i l .com> on Sunday April 29, 2007 @11:02AM (#18918713) Homepage
    Sounds great, maybe one of the Ubuntu guys can help? How about that one guy?
    • by 222 ( 551054 )
      Whoever modded that troll should investigate where Ubuntu founder Mark Shuttleworth gathered his wealth...

      Jeez, anyone with a sense of humor around here?
  • Thawte was developed by Mark Shuttleworth. He sold it for $560 million in 1999. He's now responsible for Ubuntu.
  • I thought the whole idea of trust certificate type things was because the closed source ethos means there's no way to know what's in the program you're installing, so it has to be certified as trustworthy?

    I didn't think open source needed that kind of thing.

    When it comes to installing things via browser I prefer firefox's 'authorise this domain' thing, which is independent of certificates.

    perhaps the reason there's no open source equivalent of these certificates is that its never come up as a problem.

    I may
    • by Solra Bizna ( 716281 ) on Sunday April 29, 2007 @11:52AM (#18919011) Homepage Journal

      You're welcome to teach my grandmother how to personally audit every line of source code for every program she ever installs.

      Certificates have other uses than blob signing. If nothing else, the current infrastructure of "web" certificates would allow you to verify that the mozilla.org you're about to download and run executable code from is mozilla.org and not some leet h4xxor who owned your ISP's DNS server. They're also supposed to be able to verify that it's Amazon.com Inc. you're about to give your credit card number to and you're not really at a carefully cloaked amazonn.com but in practice that kind of protection isn't dependable.

      I wish the Mozilla foundation would get a cert; AFAICT they don't have one and it freaks me out whenever I download an extension....

      -:sigma.SB (the paranoid)

      • Certificates have other uses than blob signing. If nothing else, the current infrastructure of "web" certificates would allow you to verify that the mozilla.org you're about to download and run executable code from is mozilla.org and not some leet h4xxor who owned your ISP's DNS server.

        Who is mozilla.org? Can you tell me exactly who they are or are supposed to be? What about mozilla.com, mozilla.net, mozilla.tw, mozilla.cx, etc. What about mozilla-browser.com or mozilla-firefox.org? Does any of those nam
      • https://addons.mozilla.org/ [mozilla.org]

        "The web site addons.mozilla.org supports authentication for the page you are viewing. The identity of this web site has been verified by XRamp Security Services Inc, a certificate authority you trust for this purpose"
  • by Alain Williams ( 2972 ) <addw@phcomp.co.uk> on Sunday April 29, 2007 @11:27AM (#18918849) Homepage
    It is useful to have the communication between the server and web browser encrypted, this is what https (port 443) is all about. It would be useful to be able to ensure that you are surfing the web site that you think you are ... https purports to do this, but does not do it well - as others have said.

    The problem is that if you want encryption, you either buy a certificate or you have the user presented with a misleading dialogue box that suggests that you are not trustworthy ... or rather the reverse is not true: just because you have a certificate does not mean that you are trustworthy.

    Joe Sixpack does not understand the difference - which is only good for the profits of Versign and friends.

    It would be nice if the two could be somehow unlinked.

    • You can't unlink them, because they are so deeply connected. TLS without identity gives you no security. All you have is an encrypted connection to somewhere, but no guarantee that it is the person (or machine) you though you had an encrypted connection to. Someone one router upstream from you could be proxying all of you 'encrypted' connections so you get an encrypted connection to them and then an unencrypted connection beyond that. Without a signed or pre-shared certificate, you would have absolutely
  • by tji ( 74570 ) on Sunday April 29, 2007 @11:34AM (#18918899)

    Open Source CAs are pretty straightforward. All the code is available, and people are already doing it. The difficult part is establishing the trust model. The root CA needs to be well managed. But, more difficult is the process for issuing new certificates. If you just give cert's out without strong validation of who you're giving it to, your trust model is worthless. If anyone can go in and freely get a cert, what confidence do you have that the cert holder is not a "bad guy"?

    That's why commercial CA's, like Verisign,cost money, and provide a real service. They do try to verify the organization they give cert's to. It may not be perfect,and many people complain about how strong that validation is. I can imagine what those people would think about an open source CA, and their level of validation before providing certs.
  • Absolutely Yes (Score:2, Informative)

    by Apreche ( 239272 )
    In order to do any sort of secure transaction on the web, you need SSL. If people don't see the little lock icon, they will be very unlikely to trust your website. To get that icon you need a signed SSL certificate. Sure, you can sign your own. However, if your cert isn't in the browser, then users will get a warning popup that your site might not be safe. That's worse than not having the lock in the first place.

    Verisign, Comodo, and others have a big scam going on. Whoever wants to conduct secure business
    • by Have Blue ( 616 )
      If self-signed certs were accepted at face value by browsers the entire thing would fall apart because it's just as trivial to sign your cert with "Amazon.com" as it is with your real name. And it takes money to determine that the guy who typed "Amazon.com" into the Buy Cert form and hit Submit actually works for Amazon.com, because that's far more complex than just typing his name into Google and looking for bad feedback. You have to do work in (gasp) real life.

      It's absolutely a good thing that getting
    • by neoform ( 551705 )
      >That is not cool.

      Right on maan, that does NOT ROCK..!!
  • The whole point of Certificate Authorities isn't just to distribute certificates... it's to make sure that the certificates are valid and that they are giving them to the right people. Being able to make whatever certificates I want makes the entire thing meaningless. If there is an open source CA, I could create a certificate that says I'm Linus Torvalds or Bill Gates... who would make sure that I'm really who I say I am? If you can't guarantee that the cert is correct, then it makes the CA useless.

    The
  • Should this community be related to the Mozilla Foundation and comply, since day one, with the requirements to get a root certificate in Firefox?

    I wish I could apply moderator points to articles so I could vote that part of it flamebait.

    On day one, there were no requirements to get a root certificate in Mozilla. Mozilla essentially played a "me too" game in the beginning, putting in root certificates fairly willy nilly. It was only when CACert appeared on the scene that Mozilla magically decided on

  • I think the OP is worded a little strange and but I think I understand what you are getting at. The problem here is, as others have pointed out, you would essential have a free service and you get what you pay for. Who is going to do all the identity vetting and verifications of those requesting certificates? Are you going to have a full time staff that is verifying who individuals are and that they're authorized to be making such requests? What are the odds tons of *.microsoft.com and *.whatever.gov ce
  • I think the whole certificate authority scam is a solution in search of a problem. Yes, there are useful man-in-the-middle attacks where a public key hasn't been independently validated. I won't claim otherwise. I will claim that for nearly every application there are so many avenues of attack with a higher probability of success that worrying about key validation is a little like digging a nuke bunker while terrorists buy plane tickets.

    For one thing, you don't have the wherewithal to dig a nuke bunker than
    • As long as you keep sending responses like that, I would not bother about encryption either. I'm trying to decode the response for a few minutes now, but I am drawing a blank.

      • What I said, in so many words, was that a certificate authority (open source or otherwise) generally locks the closed front door while the back door and all the windows are wide open. If that metaphor is too obtuse, I'll state it more directly: certificate authorities are presently a waste of effort.
  • by ChaseTec ( 447725 ) <chase@osdev.org> on Sunday April 29, 2007 @01:12PM (#18919491) Homepage
    https://bugzilla.mozilla.org/show_bug.cgi?id=21524 3#c164 [mozilla.org]

    Pasting for those to lazy to follow the link.

    Rich Freeman wrote:
    >
    > It just seems like as an organization we [The Mozilla Foundation]
    > should be trying to foster open source projects.

    Whoa, there. I'd just like to point out that CaCert is not an open source
    project in any sense of the term. It uses open source software *internally* to
    provide a free (as in beer) service, but CaCert distributes no free (as in
    *freedom*) software, and no software that could even remotely be considered
    open source. Just the opposite in fact, see the license here, on their site:
    http://www.cacert.org/src-lic.php [cacert.org]

    It clearly states that you:
    1. may NOT modify the source code [...]
    2. may NOT make copies of the source code [...]
    3. may NOT give, sell, loan, distribute, or transfer the source code files
    to anyone else, an, my favorite:
    4. may NOT use [CaCert] software created for any purpose or reason other than
    verifying that there are no unknown vulnerabilities or the like or otherwise
    making your own assessment of the integrity of the source code and the security
    features of the CaCert software

    Furthermore, below it goes on: "All rights not expressly granted to you
    [editorial comment: which would be "none"] in these license terms are reserved
    by CAcert. CaCert retains ownership of all copyrights and other intellectual
    property rights throughout the world in the CAcert source code and software.
    You agree that CAcert will be given a perpetual non-exclusive rights to any and
    all derived code, and you hereby assign rights in any modifications you make to
    the source code and in any bug reports you submit to CAcert."

    This just may be the single most disgusting and ill-advised hybrid software
    license I have ever read. The author apparently seeks to keep the software
    100% proprietary, guarding it from "competitors", and protecting potential
    future licensing revenue, while simultaneously benefiting from the efforts the
    open source developer community to fix its bugs, and attest that it is not
    malware, for free.

    Although I wrote an impassioned comment (#12 above, of 161 so far!)
    https://bugzilla.mozilla.org/show_bug.cgi?id=21524 3#c12 [mozilla.org] in *support* of
    CaCaert, uh, 4 years ago now, and was a CaCert user and Assurer, I discontinued
    my involvement because the source code was released by the founder only months
    later, after much prompting and delay, and when it was finally unveiled, these
    onerous licensing restrictions were "slipped in" with zero community
    discussion.

    When I asked why the code was not made open source, the founder described his
    perceived threat that if it was made open source, then other free CA's would
    start popping up out of nowhere to run our code and to compete with CaCert and
    he felt that this would decrease CaCert's chances of getting its root cert into
    Mozilla, and then IE.

    This seemed a paranoid and protectionist attitude and I've no longer
    participated in the Assurer program or the CaCert community since, though I
    have monitored the mailing lists. After the founder's recently announced
    resignation, perhaps the new board of directors (or whatever governing body
    structure they adopt) will revisit this anti-competitive, closed source
    position.

    I had though a free CA would be a good thing, and if one is good, then two is
    better, and hundred would be fantastic! So if they all *do* pop up, and share
    code and development effort, I believe that all will benefit and perhaps,
    someday, all will be accepted by all the browsers, and Verisign and the sma
  • Thawte's interface is good

    Clearly the author of that quote hasn't actually tried to use Thawte's site much. Cumbersome and arcane are better descriptions...
  • CA Cert gets much of the attention in the discussion of open source CAs, but StartCom [startcom.org] has made more progress in gaining browser support (and hence market acceptance). StartCom certs are supported by Firefox 2.0 [linuxboxadmin.com]. CACert has been working on inclusion in Firefox for several years, and appears to be getting close. Mozilla has stepped up its staff effort to review certificate authorities for inclusion in Firefox/Mozilla, including CACert.
  • that many slashdotters here make a good point about it really not being necessary to have an open source CA. CACert does the job really well and I use it for internal communication security. If you really need your own CA, it is not terribly difficult to put together a very rudimentary one. In fact OpenSSL provides just that, a very simplistic, basic CA that is not terribly user friendly at all. See the man pages for openssl ca and openssl.cnf.
  • Open Source Authority = biggest oxymoron of the decade! :)
  • There's no big problem running a certificate authority at a moderate cost per transaction. It could probably be done effectively for about $10-$20 per certificate.

    If you want to buy a certificate for an organization, identity has to be verified. The way to do this is 1) look up the organization in corporation or d/b/a name records, as appropriate, and 2) send a letter or FedEx envelope (extra charge) to the address for service of process listed therein. You'd order a certificate on line, but it's not

    • by vidarh ( 309115 )
      For an individual, require purchase with a credit card, and send the letter to the billing address of the credit card, which can be verified during credit card verification.

      That's true for only a handful or so countries in the world, and even for most of those the address verification services are woefully incomplete (that is, you have to expect them to return no result or wrong result for a fairly large percentage of users).

  • This is idiotic (Score:3, Interesting)

    by wasabii ( 693236 ) on Sunday April 29, 2007 @03:57PM (#18920587)
    The entire idea of these companies is that they present a publicly viewable, *SUE-ABLE* name to ensure a path to the company applying for the certificate. An "open ca" would be utterly useless in accomplishing this.

    The idea is that verisign and pals spend a non-zero amount of time verifying you are who you say you are. Such a non-zero amount of time costs money. Hence the certificate costs money. Whether it is priced right or not is driven only by demand and production. Deal with it, or make your own.

  • OpenPGP lets you have multiple certs for a given identity. This makes it practical for anyone and everyone to be a CA.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...