A crazy thought?
Allen
netsecurity at sound-by-design.com
Wed May 30 23:25:41 EDT 2007
Jim Dixon wrote:
[snip]
> The CA certifies that X is your public key.
________________________^^^^^^^^^
Who is you? That is the real question. To leave CAs out for the
moment, imagine J. Doe and J. Doe, two different people, each put
a public key on a server and you get a message created with a
private key. You get the public key and validate it comes from
one of the two J. Does. The question is who is the "real" J. Doe?
Is one real and the other a repudiated key? Is one real and the
other is trying to "steal" the identity of the other? Or is it
simply that there are, indeed, two people with the same name?
Adding a CA merely adds one layer of obfuscation and opportunity
for false certification.
> If the CA starts handing out false public keys - which is the worst
> that it could do, right? - it will find itself instantly distrusted.
> Everybody in the world will be able to see that the CA used its private
> key to sign a false statement.
Will they? What evidence do you have that "proves" the
certificate is bogus? Say that the person who is having his
identity stolen for whatever purpose discovers that there is a
second certificate with his name on it but a different public
key, what can he do, yell loudly, "No, I'm the real me!" How do
we know that it isn't someone who is trying to muddy the waters
and that the certificate holder is the real person?
> The offended party need only put the
> false declaration up on the Web.
How many "The Boy Who Cried Wolf" cases would have to happen
before we wouldn't trust *any* public key to represent who we
think it does?
How will dissident groups keep from getting compromised when
fighting oppression?
Best,
Allen
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list