Received: from sog-mx-2.v43.ch3.sourceforge.com ([172.29.43.192] helo=mx.sourceforge.net) by sfs-ml-3.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1WK45a-00036w-CT for bitcoin-development@lists.sourceforge.net; Sun, 02 Mar 2014 10:57:46 +0000 Received-SPF: pass (sog-mx-2.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.219.44 as permitted sender) client-ip=209.85.219.44; envelope-from=mh.in.england@gmail.com; helo=mail-oa0-f44.google.com; Received: from mail-oa0-f44.google.com ([209.85.219.44]) by sog-mx-2.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1WK45Z-0001VT-CX for bitcoin-development@lists.sourceforge.net; Sun, 02 Mar 2014 10:57:46 +0000 Received: by mail-oa0-f44.google.com with SMTP id n16so5887890oag.17 for ; Sun, 02 Mar 2014 02:57:40 -0800 (PST) MIME-Version: 1.0 X-Received: by 10.60.161.81 with SMTP id xq17mr11513428oeb.3.1393757859961; Sun, 02 Mar 2014 02:57:39 -0800 (PST) Sender: mh.in.england@gmail.com Received: by 10.76.71.231 with HTTP; Sun, 2 Mar 2014 02:57:39 -0800 (PST) In-Reply-To: <1393704464.6290.118.camel@mimiz> References: <1393704464.6290.118.camel@mimiz> Date: Sun, 2 Mar 2014 11:57:39 +0100 X-Google-Sender-Auth: -hf_on0DKEv9yMIC9ysWRCVDSuU Message-ID: From: Mike Hearn To: Dev Random Content-Type: multipart/alternative; boundary=089e01229a8c2563f204f39d8a98 X-Spam-Score: -0.5 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (mh.in.england[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 1.0 HTML_MESSAGE BODY: HTML included in message 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1WK45Z-0001VT-CX Cc: Bitcoin Dev Subject: Re: [Bitcoin-development] BIP70 extension to allow for identity delegation X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Mar 2014 10:57:46 -0000 --089e01229a8c2563f204f39d8a98 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On Sat, Mar 1, 2014 at 9:07 PM, Dev Random wrote= : > I'm wondering about the small business case. A small business or an > individual might not have the technical expertise to perform the > delegation signature. If they take delivery of an SSL cert from the CA themselves, I don't see why it'd be an issue. A simple GUI app can be produced that let's you open the CA cert files and spits out the ExtendedCert file, which you then send to the PP. However, for small businesses like local shops, yes we don't expect them to have a CA cert at the moment. Many of them do have small websites but for those that don't, I don't think any great solutions exist yet. A virgin market waiting to be tapped, perhaps ... > Do you think it makes sense to have another scheme where a merchant can > be name spaced under the payment processor? This would require just one > additional field - the merchant identifier. > What is "the merchant identifier" exactly, and what does it mean? If this question is left unresolved, then it doesn't mean anything and as such it's equivalent to putting the merchant name in the memo field, which is fine and what I expect to happen for now. If it's resolved, then it makes payment processors into certificate authorities themselves. I think such a solution would be spiffy, but it can be done within the same framework we have today by just having wallets add some Bitcoin specific roots to their trust store before PKI verification. For example, BitPay could become their own CA that doesn't issue SSL certs but rather "local business certs" that contain a verified street address. Indeed X.509 certs include X.520 names, that's one reason they're so damn complicated, and that's already got ways to express organisation names. Actually setting such a scheme up requires real work though. If we want a wallet to display something like: "Pay to: Room 77, Graefestra=C3=9Fe 77, Berlin" then the question is, how is that verified and what does it mean when a payment processor issues a cert containing it? Did someone physically visit them? Did they just check on Google Maps? Does it mean it's a real incorporated business or could it just be the address of a childs lemonade stand? My inclination would be to say that the ID requirements should be low and cheap; for our primary use case of making hardware wallets secure, you don't need robust ID verification, you just need to ensure a MITM can't issue themselves duplicated ID's on the fly. Just posting a postcard with a nonce on it would be sufficient IMO (or making a phone call to a number obtained from a previously verified business listing). Alternatively, a bitcoin payment processor CA could make visiting a business, gathering photo evidence and issuing a cert into a kind of microwork task with the PP/CA acting as a broker. --089e01229a8c2563f204f39d8a98 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
On S= at, Mar 1, 2014 at 9:07 PM, Dev Random <c1.devrandom@niftybox.net<= /a>> wrote:
I'm wondering about the small business case. =C2=A0A s= mall business or an
individual might not have the technical expertise to perform the
delegation signature.

If they take delivery= of an SSL cert from the CA themselves, I don't see why it'd be an = issue. A simple GUI app can be produced that let's you open the CA cert= files and spits out the ExtendedCert file, which you then send to the PP.<= /div>

However, for small businesses like local shops, yes we = don't expect them to have a CA cert at the moment. Many of them do have= small websites but for those that don't, I don't think any great s= olutions exist yet. A virgin market waiting to be tapped, perhaps ...
=C2=A0
Do you think it makes sense to have anoth= er scheme where a merchant can
be name spaced under the payment processor? =C2=A0This would require just o= ne
additional field - the merchant identifier.

=
What is "the merchant identifier" exactly, and what does it = mean? If this question is left unresolved, then it doesn't mean anythin= g and as such it's equivalent to putting the merchant name in the memo = field, which is fine and what I expect to happen for now.=C2=A0

If it's resolved, then it makes payment processors = into certificate authorities themselves. I think such a solution would be s= piffy, but it can be done within the same framework we have today by just h= aving wallets add some Bitcoin specific roots to their trust store before P= KI verification. For example, BitPay could become their own CA that doesn&#= 39;t issue SSL certs but rather "local business certs" that conta= in a verified street address. Indeed X.509 certs include X.520 names, that&= #39;s one reason they're so damn complicated, and that's already go= t ways to express organisation names.

Actually setting such a scheme up requires real work th= ough. If we want a wallet to display something like:

=C2=A0 =C2=A0"Pay to: =C2=A0Room 77,=C2=A0Graefestra=C3=9Fe 77, Ber= lin"

then the question is, how is that verified and what does it mean= when a payment processor issues a cert containing it? Did someone physical= ly visit them? Did they just check on Google Maps? Does it mean it's a = real incorporated business or could it just be the address of a childs lemo= nade stand?

My inclination would be to say that the ID requirements= should be low and cheap; for our primary use case of making hardware walle= ts secure, you don't need robust ID verification, you just need to ensu= re a MITM can't issue themselves duplicated ID's on the fly. Just p= osting a postcard with a nonce on it would be sufficient IMO (or making a p= hone call to a number obtained from a previously verified business listing)= .

Alternatively, a bitcoin payment processor CA could mak= e visiting a business, gathering photo evidence and issuing a cert into a k= ind of microwork task with the PP/CA acting as a broker.
--089e01229a8c2563f204f39d8a98--