Hi Kyle,

Kyle Hamilton wrote:
> I'm just going to point out something that a couple of friends  
> recently pointed out to me.  The business models of commercial CAs  
> involves what is essentially "selling trust".
>
> If you look at the fact that they have no real accountability, no  
> procedure in place in any of the browsers to revoke their trust as a  
> matter of policy if they violate their CSPs, and a need to maintain a  
> positive cash flow, you will quickly see that there are severe  
> conflicts of interest inside the individual organizations.
>   
I'm aware of that very much!
> (If you don't believe my assertion that there is no means to remove  
> root certificate trust as a matter of policy, I am still waiting for  
> action on Thawte's issuing of SSL123 certificates by a root which had  
> a CSP which stated that no SSL server certificates would be issued  
> without at least "medium assurance" of identity.  This issue was  
> brought up before I moved to my Mac as my primary machine, so over a  
> year and a half ago.)
>   
Of course I'm understanding your disappointment of such a violation. 
However the Mozilla CA policy defines only a minimum requirement in its 
policy, should this one be breached, it would be a reason for removal. 
There is, to my very big disappointment, no way to distinguish between 
domain validation and identity validated and/or organization validated 
certificates. The only thing which exists today is EV and all the rest.
> Frankly, this entire discussion is utterly and disgustingly ludicrous  
> in light of this.
>   
Ridiculous? I think, placing a CA root (even with limits) into just 
anybodies hands without any verifications and controls in place is 
unacceptable. So why should any CA bother to provide third party 
attestations, not speaking about actually writing and implementing a 
policy etc.? Because some CAs had sloppy procedures in place before that?
> Add to this the fact that there is no legal recourse available for  
> "relying parties" if the CA somehow fails to live up to its CSP, and  
> the entire argument falls completely on its face.
>   
I agree that it's difficult, but not impossible. But you can't sue a CA 
which told you upfront what they are not going to do. In this case they 
tell us quite frankly that they have no intention to perform any 
acceptable controls and verifications. Their CP/CPS says so and with 
being that the legal framework, you can't even thinking about suing.
> You all seem to be frighteningly disconnected from the realities of  
> the situation if you're still arguing the minutae of trust models  
> allowed by CSPs.  I lost my faith in the process you're trying to  
> follow long ago.
If this is the case, we should allow any CA into NSS, most notably a 
certain Australian project. The barrier would be a self-audit, as in the 
case of the WISeKey subordinate CAs.


-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to