Frank Hecker wrote: > Eddy Nigg (StartCom Ltd.) wrote: > <snip> > >> ... _I'm requesting >> hereby and now to have thorough review of this situation and >> reassessment_ of the Mozilla CA policy concerning everything related to >> sub-ordinated CAs. >> > > This is a good discussion to have, and I agree that it's a timely issue.
Frank, in addition to that I would suggest that you examine immediately if to stop any processing upgrades for EV (and inclusion requests) until we decide what we are going to do exactly in regards of sub-ordinated CAs, specially concerning EV. Because after I visited bug https://bugzilla.mozilla.org/show_bug.cgi?id=376853 which David mentioned earlier, I found something even more surprising than I expected: Network Solutions has a server certificate issued by "Network Solutions EV SSL CA". Ever heard of this CA? Well, it's chained like this: "AddTrust External CA Root" from Sweden and belongs to Comodo from the United Kingdom -> "UTN-USERFirst-Hardware" from the US -> "Network Solutions Certificate Authority" from the US -> "Network Solutions EV SSL CA" (Surprise!) -> "www.networksolutions.com" Now, I have no clue how this is going to work and perhaps Nelson can give us some more information....example: If AddTrust is going to be upgraded to an EV root, is any sub ordinated CA potentially an EV CA? Apparently Network Solutions have a relevant CPS published at their web site, but were they audited according to the WebTrust EV criteria? I'm not saying anything about what they are and what they did, since right now I'm not investing my time in it to find out, but supposed they were not audited accordingly, then this would raise for me the alarm bells. Perhaps somebody knows to explain how this technically will work and how the criteria and CAB Forum guidelines are meant to be. I was very much under the impression and it was stated again and again as an argument in favor of a positive vote at the CAB Forum, that for EV all CA certificates issuing EV certificates will be audited accordingly (and not by proxy of some parent root CA). Another argument which was given here, that NSS will be able to pick only CA certificates which are really EV and confirmed as such, but suddenly I've got the feeling that we are going to repeat a well known story once again...?? Of course this was one of the reasons why I called for a reassessment of the Mozilla CA policy concerning sub-ordinated CAs, but right now I wouldn't know what the rules in that respect are (and going to be) in order to judge such an upgrade or inclusion request. I'm looking at the certificate details of Network Solutions and have no idea how to handle that. In short we need to lay down the rules urgently and I suggest in the meantime stop all other work in regards to inclusions and upgrades until we've solved this problem. -- Regards Signer: Eddy Nigg, StartCom Ltd. <http://www.startcom.org> Jabber: [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]> Blog: Join the Revolution! <http://blog.startcom.org> Phone: +1.213.341.0390 _______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto