On Sun, 2013-02-10 at 17:15 +0100, Thijs Kinkhorst wrote:
> On Sun, February 10, 2013 15:52, Ben Hutchings wrote:
> > On Sun, 2013-02-10 at 12:38 +0100, Florian Weimer wrote:
> >> * Ben Hutchings:
> >>
> >> > According to
> >> > <https://www.globalsign.com/certificate-authority-root-signing/>, any
> >> > organisation may buy a secondary CA certificate signed by one of
> >> > GlobalSign's root CA certificates.  These should therefore not be
> >> > trusted by default.
> >>
> >> This is actually true for many of the roots.
> >>
> >> You should bring this up on the Mozilla lists, I think.
> >
> > I know that many CAs issue secondaries to other organisations.  The
> > question then is how careful they are about vetting and auditing the
> > other organisations.  This page and the linked 'datasheet' basically say
> > 'pay us to make your internal CA trusted by everyone'.
> 
> I disagree that they say that. Obviously, these are high-level one-page
> marketing descriptions that lack any technical implementation detail,
> including policies on audits and vetting.

Actually some technical details are on that 'datasheet', such as a list
of browsers and operating systems that trust the GlobalSign root CA.

> That is no surprise as this is
> not intended to be a CP/CPS. The page for example also doesn't detail a
> pricing scheme, although I'm very certain that there is one.

Sure, it explicitly says 'request a quote'.

> I don't think we should be making any decision based on single page
> leaflet texts. A CP/CPS is a much more useful document to base on. The
> Mozilla inclusion process encompasses review of such documents.

You're probably right, though marketing seems to be a relevant
consideration when assessing what their actual practices are.

Ben.

-- 
Ben Hutchings
I'm always amazed by the number of people who take up solipsism because
they heard someone else explain it. - E*Borg on alt.fan.pratchett

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to