60 likes | 158 Views
In the CA I trust. A look at Certification Authorities. James E. Shearer CSEP 590 March 8 th 2006. The Public Key Infrastructure is adjudicated by the individual States.
E N D
In the CA I trust.A look at Certification Authorities James E. Shearer CSEP 590 March 8th 2006
The Public Key Infrastructure is adjudicated by the individual States "Laws and policies for digital signatures should balance the need for consistency across state and national boundaries, the need to allow for experimentation and innovation, and need to respect traditional state jurisdictions, e.g., commerce, contracts, and state rules of evidence." American Bar Association, 1997 “Contracts involving interstate or foreign commerce may not be denied legal effect, validity, or enforceability solely because it and/or the signatures on it are in electronic form.” Electronic Signatures In Global And National Commerce Act (E-Sign) passed in the Congress of the United States, June 2000[2].
States have taken 2 approaches Electronic signature laws Secure signature laws • Clarify how current law should apply to electronic authentication. • Explicitly recognize that many different technologies are capable of creating valid signatures, including digital images of signatures, PIN numbers, and biometric devices. • Give special statutory benefits (such as evidentiary presumptions and liability limits or other special recognition) for electronic signatures that have an established degree of reliability States include Utah, Washington and Minnesota States include Florida, Virginia, and Texas "If a law requires a signature or record to be notarized, acknowledged, verified, or made under oath, the requirement is satisfied if the electronic signature of the person authorized to perform those acts, together with all other information required to be included by other applicable law, is attached to or logically associated with the signature or record." • "Where a rule of law requires a signature, or provides for certain consequences in the absence of a signature, that rule is satisfied by a digital signature, if: • The digital signature is verified by reference to the public key listed in a valid certificate issued by a licensed certification authority; • The digital signature was affixed by the signer with the intention of signing the message; and • The recipient has no knowledge or notice that the signer either breached a duty as a subscriber; or does not rightfully hold the private key used to affix the digital signature." Texas Business and Commercial Code, Chapter 43; Uniform Electronic Transaction Act RCW 19.34, Washington Electronic Authentication Act
CA Certification Certification Authorities are approved: • by the State (E.g., Washington) • by a designated (non-government) registration authority (E.g., Kansas) CAs must show: • Their equipment and processes protect the CAs’ private keys adequately, • Their processes verify the authenticity of subscribers adequately, • (At least in Washington) They have an office or representative in the state. CAs document their processes in a Certification Practice Statement (VeriSign’s is 73 pages long). Washington has licensed VeriSign and Digital Signature Trust. (VeriSign bought Thawte in 2000)
Classes of Certificates VeriSign offers certificates in classes 1 – 3 US Postal Service offers Electronic Postmark Service certificates in class 0
Liability CA is largely immune • CA is liable for damages resulting from inappropriate subscriber authentication to an amount determined in the CA’s own CPS • Washington law exempts the CA from liability for: • Lost or forged certificates • Punitive or exemplary damages • Damages for pain and suffering Subscriber is vulnerable to breach of contract • Subscriber is liable for damage resulting from loss or theft of certificates Relying Party carries burden of proof VeriSign’s CPS specifies that before any act of reliance, the Relying Party is responsible for understanding VeriSign’s CPS and verifying: • appropriateness of the certificate for the transaction, • verification of key usage field extensions, • the state of all certificates in the Relying Party to Root path - This is interesting since the whole process is largely automated!