On Fri, Feb 7, 2020 at 11:00 AM Wayne Thayer <[email protected]> wrote:

> I'd like to see Mozilla require an incident report from CAs that can't or
> won't follow the existing guidance (by either supplying a revised audit
> statement, revoking the certificate, or adding it to OneCRL). A number of
> CAs have resolved these issues by following this guidance and I recommend
> against adding a grace period at this time for those who have not.
>

Right, apologies if it wasn't clearer: I was suggesting that the existing
guidance be the one granted the grace period (with the expectation that
folks follow)

Following that grace period, the option becomes revoking the certificate.

<snip>
>
> I realize Mozilla uses OneCRL to address the gap there, but ostensibly this
>> is a straight BR violation regarding providing continuous audits. The
>> proposed revisions will make this unambiguously clearer, but either way,
>> the best path to protect the most users is to require the CA to revoke
>> such
>> certificates.
>>
>> This also hopefully has the desired effect of forcing CAs to pay closer
>> attention to the requirements placed on them, and ensure that the
>> negotiate
>> and scope their audits to ensure they’re actually meeting those
>> requirements.
>>
>>
> I agree, but I also think that ALV will cause these issues to be caught
> and quickly corrected in the future (assuming the CA has properly disclosed
> all CA certificates).
>

I agree, ALV will catch these sooner. I took Kathleen's question to be
primarily about "How do we handle CAs that have had undetected problems",
and my point is that this should only be temporary.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to