On Fri, 2014-03-14 at 11:22 +0100, Thomas R. Koll wrote:
> Those certificates packaged by and copied over from Mozilla do fullfil their
> policy which can be found here: 
> http://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/
> 
> In the inclusion section your can find a lot of ways to get accepted by 
> Mozilla,
> but CACert has failed to fullfil any of those. And to quote from their policy:
> "The burden is on the CA to prove that it has met the above requirements.“
Well that's the "de jure" situation... the de facto situation is that
there's only one thing that counts here: money

Just read up the case of Turktrust.
And the funny part here: With the too-big-to-fail CAs like Verisign,
Comodo, Thawrte... one can understand that Mozilla cannot really do
much... but Turktrust is like... I mean has anyone ever seen a website
with a cert signed by them? I didn't ... any my browser collects all
certs ever seen.
So they could have easily thrown them out, once they proved clearly to
be evil,... but Mozilla choose rather the money than the "security" of
their users.


> But who knows, with CACert’s move from Australia to Germany we could
> see some more action behind the efforts for an audit.
Well even with a proper audit, you can't _trust_ CAcert more than you
can now,... simply for the same reason that 3 people are already capable
of forging any identity...
At least for "email certs"... and with respect to server certs... the
only "check" CAcert (as well as many commercial CAs - in their cheapest
SSL "product") does is: sending an (unsecured) mail to an address in the
whois for the domain.
Absolutely stupid and insecure.

There's the point... you can't really get any trust to all of these CAs.


Cheers,
Chris.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to