[Intro; long time lurker but I rarely post, but given this is an open
question not directly tied to any CA or official capacity my opinions are..]

On 08/18/2017 05:02 PM, Gervase Markham via dev-security-policy wrote:
> Sometimes, CAs apply for inclusion with new, clean roots. Other times,
> CAs apply to include roots which already have a history of issuance. The
> previous certs issued by that CA aren't always all BR-compliant. Which
> is in one sense understandable, because up to this point the CA has not
> been bound by the BRs. Heck, the CA may never even have heard of the BRs
> until they come to apply - although this seems less likely than it would
> once have been.
> 
> What should our policy be regarding BR compliance for certificates
> issued by a root requesting inclusion, which were issued before the date
> of their request? Do we:
> 

Iff the CA has known non-BR compliant certs issued I would be in favor
of the CA setting up a new, clean root certificate for the inclusion in
the root program at this point, and require all the certificates issued
by the approved root to be BR compliant.

> A) Require all certs be BR-compliant going forward, but grandfather in
>    the old ones; or
> B) Require that any non-BR-compliant old certs be revoked; or
> C) Require that any seriously (TBD) non-BR-compliant old certs be
>    revoked; or
>

If new root required for non-BR compliant history, the issues above
seems mitigated

 D) something else?

Yes please


-- 
----------------------------
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
----------------------------
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
----------------------------
Nil satis nisi optimum
Nothing but the best is good enough

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to