Subject: Policy-Discussion
List archive
- From: Alex Robertson <alex-uk AT cacert.org>
- To: cacert-policy AT lists.cacert.org
- Subject: Re: CCA: open points / comments
- Date: Tue, 27 May 2014 20:50:33 +0100
On 27/05/2014 15:36, Eva Stöwe wrote:
Dear Alex,
Including the death of a member as a trigger is sufficient to meet that
demand.
However then leaving it with a non-existent policy as to what the
response to that trigger should be negates that.
Therefore please either define the subsidiary policy - or leave the
current text alone (or put it into in a "stub" policy) - you can always
come back to it later.
So what is wrong with my suggestion - it moves towards the framework you want and doesn't leave a gaping hole to fall into! I'm not against the idea of a separate policy or even a procedure about the matter, but I do want to know what I am agreeing to.
It's not a "you" it's a "we". And also as long as there is no policyNot true - as far as I can recall I've been in favour of death as one of several triggers that may cause a termination process to occur. I may have issues about the process triggered - but that's another matter.
installed there will always be arbitration. But leaving it with the
arbitrator just does not work. And you are one who
was strictly against death being a trigger - it also cannot be if it s left
with the arbitrator, because either the death is the trigger, or the
decision of the arbitrator. And there is no way that a death automately
activates an arbitrator or an arbitration case.
Agreed - with the proviso that we are talking about accounts here. Sharing a machine leaves things like keys at keast potentially accessibleNo.There is also no reason for sharing of an account (assisting someoneHmm... then perhaps what YOU mean by "sharing" is not what I mean.... so
with the access for example because of medical reasons is not sharing!).
warrants clarification. If anyone else has access to the account or to
the machine, the account's security becomes questionable. This could
(I'm not saying it will!) easily occur in the example above or in the
case of multiple users on a single machine or even in the case of the
theft of a machine.
a) Sharing a machine is not sharing an account.
b) Sharing is something intentional, theft is not - at least if one takesAgreed - although there may also be an element of force upon the account holder to share.
some sensible precautions
c) Assisting someone with access does not need to involve any sharing. ItThis is where it gets less black and white. Similarly with families. I can choose to trust whoever to provide assistance - but I cannot guarantee that the trust will not be abused either accidentally or with malicious intent.
may be that only the assistant has actual access to the account but only
data of the assisted person is handled and it is only the will of the
assisted persen relevant (or whoever may voice the will for the assisted
person).
In many cases one also finds that someone other than the user may set up the certificates (and hence the keys!) - typically a family member and this may include setting up the account for them. It's not quite "sharing" but it is getting very close to it in that the account holder may have little or nothing to do with the actual account.
However the moment a machine is shared any *keys* on it are potentially vulnerable (So are stored passwords!). Bear in mind that many people are not technically familiar with what goes on "behind the scenes" and that it is relativly trivial to get keys out of a Windows system. It took me about four minutes to find out how to do this and to extract my keys from what Microsoft claimed was "secure storage" when I switched my CAcert mail onto a Thunderbird variant!
It would contradict the ideas of our accounts, the definition of aThis comes back to 2.5 as it stands - "reasonable precautions" should be
member in CCA and the idea of AP. It also contradicts our privacy and
security ideas of not sharing personal information (in the case of
assurances) and to keep precautions that someone else can impersonate
oneself.
taken by an account holder.
It's both very good and very bad at the same time. Given that we are assuring identity, we should probably be looking at the identity being the "account" as it becomes easy to abuse otherwise - there's at least one arbitration about abuse of multiple accounts including "cross assuring" - it's wrong, it's against the rules but I am not aware of any active checks being made to prevent it happening. Another possible abuse is that of "ballot box stuffing" on eg PolGrp votes - if someone has multiple accounts, they can potentially have multiple votes! Again there is little if any checking as far as the democratic process is concerned (NB Benedikt!)It is already there and nobody suggested to change it. IMHO It is probablyAccounts do not cost anything, one even can have multiple ones forI actually have greater issues with this than with "sharing" - whatever
different contexts or whatever.
we may decide that means. I'll leave that as a matter for another day
though.
one of the best parts of the CCA.
That's not how it appears to be actually happening - it appears as though your country prefers to steal them instead!although2.5b Various countries - certainly including UK and US (and I think AU)
have legislation in place that can enforce surrender of keys allegedly
for anti-organised crime and anti-terrorism reasons in their
legislation. Given this, *I'd prefer not to add such a clause*,
directionI could "live with it under protest". If such a clause is put in place,
I'd suggest that this perhaps needs to be considered, and that
itbe given to clarify what action a member of the community should take
No they have not. Not legaly. Neither has EU legislation.Even in Germany you are likely to be affected by this - there areit did. I also think we would be on "dodgy ground" if such legislationThose laws are part of the reason why people not living there (and
applies to NSW-AU as we take that as our "governing law"!
probably also people living there) come to CAcert for certificates,
because it is one of the few CAs not based in the USA so that such laws
are not the basis of the CA. And our RA is spread out so that it cannot
be affected as easily by such laws.
various German organisations that may have this type of power (BfV and
BND come to mind) and there is a considerable amount of EU legislation
that's at least related as well.
Nobody may force me to hand out my private keys under German or EU law. Not
even a judge.
(Well, at least not any private key that is not stored on a device owned by
someone else - so I may have to hand out that device.)
Instead of doing it openly, the German authorities seem to prefer to sneak spyware onto the machines of people that they are interested in.see http://www.globalresearch.ca/germany-calls-for-less-democracy-police-caught-planting-spyware-on-personal-computers/27107 as one discussion - this has been going on for years and is still continuing with allegations that a new improved version of state-sponsored malware will be out sometime this year. It's probably illegal, it's probably against the German consititution but it is (allegedly) still going on with some degree of "official blessing".
It may or may not be - show me the research and maybe I'll believe it,You make sweeping assumptions here as to why people choose to come toNo. But when I speak about reasons why people joined CAcert recently, this
CAcert - I suspect that the vast majority of people don't even consider
them. They may be your reasons - but they are not mine!
reason is a major one.
If you just want to have free certificates there are other - moreThere are certainly other organisations out there - I am not in a position to judge whether they are "more professional" - there are certainly organisations that are regarded as "reputable"
professional CAs that even are in the browsers.
Perhaps you'd care to expand on this - bearing in mind that sharing account <> sharing keys.Regardless of that, it makes no difference to the individual - they areThis may be the case. And there even may be people who will decide one way
still subject to the laws of their land, whether you like that or not.
The CA doesn't hold the keys, the individual does. The only choice the
individual will have if their keys are demanded by a competent legal
authority in their country is to either comply with the law and break
CAcert's rules as proposed or to face fines or jail for breaking the
law. This is the place to make that clear and possibly to provide
explicit guidance.
or the other or destroy the keys or whatever.
The consequences of such action from the point of view of CAcert would have
to be decided by an arbitrator who would cosider the whole situation and
decide based on that.
Also NSA & Co are by way not the only "persons" whom one can share keys
with. There are enough other situations covered by such an addition which
would make it worth to have something installed.
If we do not define something like this, CAcert may be reliable for such aNot necessarily - it would normally depend on the terms of the contract they have - in all cases I believe it falls back to NSW law under either CCA or under NRP rules.
break under continental law for everybody (external) who was relying on the
certificates - which is a much greater legal issue than how to treat
someone in such a case. And for those external persons probably continental
law would apply. Especially as our servers are in NL.
I personally don't think account sharing is currently allowed because of the "reasonable precautions" clause if nothing else - but, due to human nature, it does happen and it will continue to happen whatever we may decide upon - this point was made by IanG quite strongly in the side-discussion.As far as I am concerned, 2.5 works reasonably well as it stands andAs I said in the side-discussion. The fact THAT you read that above sharing
thus is in no real need of change!
is currently allowed is the reason why I think that it does not work. Else
I would agree with Benedikt.
We are unlikely to find out that this has happened until/unless something goes wrong at which point we are "stuck with it" and Arbitration has to sort it out hence my preferred phrasing "You should not share your account but if you do you are responsible for all activity based on that account" as it makes it totally clear who is to be held accountable.
What about simplifying it to "You are responsible for all activity on your account" and just leaving it at that.
The difficulty with the "must not" approach is that you cannot logically then make the conseqences explicitly clear at that point. (Most criminal law is based on the concept that you should not do certain things but if you do there are likely to be consequences - "you should not murder your neighbour - but if you do, you may face the death penalty"
Regards
Alex
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature
- Re: CCA: open points / comments, (continued)
- Re: CCA: open points / comments, Eva Stöwe, 05/27/2014
- Re: CCA: open points / comments 2.5, Eva Stöwe, 05/27/2014
- Re: CCA: open points / comments 2.5, Alex Robertson, 05/27/2014
- Re: CCA: open points / comments 2.5, Benedikt Heintel, 05/27/2014
- Re: CCA: open points / comments 2.5, Alex Robertson, 05/28/2014
- Re: CCA: open points / comments 2.5, Eva Stöwe, 05/28/2014
- Re: CCA: open points / comments, Eva Stöwe, 05/27/2014
- Re: CCA: open points / comments 2.5, Ian G, 05/28/2014
- Re: CCA: open points / comments 2.5, Eva Stöwe, 05/28/2014
- Re: CCA: open points / comments 2.5, Ian G, 05/30/2014
- Re: CCA: open points / comments 2.5, Benny Baumann, 05/29/2014
- Re: CCA: open points / comments, Alex Robertson, 05/27/2014
- Re: CCA: open points / comments, Eva Stöwe, 05/28/2014
- Re: CCA: open points / comments, Alex Robertson, 05/29/2014
- Re: CCA: open points / comments, Ian G, 05/30/2014
- Re: CCA: open points / comments, Benny Baumann, 05/29/2014
- Re: CCA: open points / comments, Alex Robertson, 05/29/2014
- Re: CCA: open points, Benny Baumann, 05/29/2014
- Re: CCA: open points, Alex Robertson, 05/29/2014
Archive powered by MHonArc 2.6.18.