Re: TLS Everywhere

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Eduard,

On Tue, Aug 13, 2024 at 9:29 AM Vasilenko Eduard <vasilenko.eduard@xxxxxxxxxx> wrote:

Hi Ted,

I am a client of the biggest bank (by all parameters: number of clients, money, whatever) in my country. The US has requested all certificate authorities to ban this bank. They did cancel certificates that have been prepaid for up to 10 years.


Here is the list of current CA/Browser forum members:  https://cabforum.org/about/membership/members/ .  As you can see, there are quite a few more than a handful and they stretch across many different national jurisdictions outside the US.  There are, however, international sanctions in place that have impacted the issuing of certificates (https://dig.watch/updates/russia-creates-its-own-tls-certificate-authority-to-bypass-sanctions).  Is this the situation you are describing?
 

I have manually installed the root certificate in the firefox to access the bank. The majority of people (tens of millions) did follow the advice to use a locally developed browser that has a proper certificate pre-installed.

Is it a proper example? For all CAs.


Nick's message called the use of Certificate Authorities "a backdoor to Internet censorship", but government-mandated sanctions are a bit different than the CAs independently applying rules to limit who can participate on the web. 

regards,

Ted Hardie


 

Eduard

From: Ted Hardie <ted.ietf@xxxxxxxxx>
Sent: Tuesday, August 13, 2024 10:28
To: Nick Lockheart <lists@xxxxxxxxxxxxxx>
Cc: ietf@xxxxxxxx
Subject: Re: TLS Everywhere

 

Hi Nick,

 

It sounds like you don't have a problem with TLS, but do have a concern that the CA/Browser forum's choices might limit the number of websites that are able to use TLS.  First, can you indicate any specific CAs which have sought approval and been denied?  Specifically are there any that met the baseline requirements (https://cabforum.org/working-groups/server/baseline-requirements/) and were denied?  Have you talked to the CA/Browser forum about this topic?

 

Second, you mention Let's Encrypt and note it doesn't solve the problem.  Acme is meant to lower the administrative burden for getting and using TLS certificates and it has been an enormous success, in part because Let's Encrypt lowered the cost associated with getting a certificate to zero.  The costs of a CA were formerly one of the most serious barriers to deployment.  Having one of the available CAs be both free and easy to configure  certainly seems to contribute to an Internet that is both open to all and secure for anyone who cares to press the right buttons.  Let's Encrypt is not so much a gatekeeper as a helpful friend holding the door for you.

 

Third, your call to action is this: 

 

In order for the Internet to remain free and open, we need a system
where websites can use TLS security, and have their pages load in all
major browsers, **without** needing any permission from a TLS
Gatekeeper.

 

TLS security requires authentication and PKIs are mostly the way that authentication is delivered.  If you want to propose other authentication methods or adopt other authentication methods, I think you'd need to have some evidence that those methods provide equivalent security and are easier to use.  Andy has mentioned DANE/TLS-A as an alternative; while it is a possible route away from CAs, it can be daunting to configure and a wholesale switch to it seems unlikely.  Do you have an actual alternative to CAs to propose?

 

As full disclosure, I was one of the first chairs of ACME and my company (and specifically my group) supports the work of ISRG/Let's Encrypt financially.

 

regards,

 

Ted Hardie

 

On Mon, Aug 12, 2024 at 8:21 PM Nick Lockheart <lists@xxxxxxxxxxxxxx> wrote:


I'm very concerned about the move to "TLS Everywhere". Not because I am
opposed to TLS security, but because of how TLS is currently
implemented in major browsers.

The Internet is supposed to be open for all. And historically, it has
been. Anyone can create a website and post it online, and there aren't
any gatekeepers.

The problem with TLS, however, is that all major browsers will block
your website unless you have a certificate signed by one of a small
handful of "Chosen Few" Certificate Authorities that are hard-coded
into the browser.

This effectively means that in order to add TLS to your website, you
need permission from a very small handful of approved people.

This makes the TLS/HTTP2 Internet almost like an app store. You can't
run an app on an iPhone without Apple's permission, and you won't be
able to have a website that isn't blocked, unless you get a signature
from Verisign, Comodo, or "Let's Encrypt".

Let's Encrypt doesn't solve this problem. It's free to put an app in
the Apple app store, too.

It's the permissions, or the gate-keeping, that is the issue.

In order for the Internet to remain free and open, we need a system
where websites can use TLS security, and have their pages load in all
major browsers, **without** needing any permission from a TLS
Gatekeeper.

In short, the current TLS system, as implemented, is a backdoor to
Internet censorship. We need to come together and find a better way.



[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux