Eddy Nigg (StartCom Ltd.) wrote:
<snip>
> ... _I'm requesting 
> hereby and now to have thorough review of this situation and 
> reassessment_ of the Mozilla CA policy concerning everything related to 
> sub-ordinated CAs.

This is a good discussion to have, and I agree that it's a timely issue. 
I'd only add that I think in addition to the policy itself, we also need 
to discuss the surrounding context as well. This includes some of the 
technical issues that have been raised in various bugs: to what extent 
CAs implement name constraining mechanisms, and how well-supported they 
are by NSS; revocation checking for subordinate CA certificates; and so on.

> In connection of this request, I'd also like to have cross-signing 
> between CA roots defined in the Mozilla CA policy, since cross-signing 
> might touch a similar field, which could at some point land us in a 
> similar situation of loosing control.

Again, there are technical issues here I'm not fully clear on, relating 
to how NSS handles cross-signing in various contexts, including cases 
where cross-signing causes there to be multiple possible paths from an 
end entity certificate to a trust anchor.

Any policy revision is going to have to take the above-mentioned (and 
possibly other) technical issues. So my personal priority is first 
getting definitive answers on the state of these issues today, and how 
we can reasonably expect that state to change in the future (e.g., based 
on NSS enhancements and fixes already planned, or those that might be 
possible assuming additional funding from the Mozilla Foundation or 
whomever).

Frank

-- 
Frank Hecker
[EMAIL PROTECTED]
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to