Eddy Nigg (StartCom Ltd.) wrote:
> Kyle Hamilton wrote:
<wnip>
>> I have not.  I must point out, though, that Frank has essentially
>> stated that it's impossible to remove an already-vetted CA.
> Did Frank say that? I don't think so...

I didn't quite say that, but I can understand why Kyle interpreted my 
comments that way. What I have said in the past is that because of the 
impact of removing a root, particular a root that has lots of server 
certs chained up to it, we're not going to remove a root unless the 
security threat is high enough to warrant it, and in practice we're 
likely to set that bar pretty high. It's analogous to having a security 
vulnerability in Firefox's implementation of JavaScript; we're not 
likely to just disable JavaScript in order to fix the problem.

Of course, with JavaScript problems we have the option of actually 
fixing the bug, and trying to do so in a way that affect existing 
JavaScript-based applications as little as possible. By contrast we seem 
to have but one option, removing the root and breaking things. However 
I'm not sure it's really that back and white. We can certainly make 
public comments and complaints about CAs, and can threaten to remove 
roots in some future release if problems were not fixed; in some cases 
just the threat might be enough.

Also, if we had appropriate technical infrastructure for this in NSS or 
PSM, we could also put CAs into a form of "probation", where their roots 
were still included but sites chained to that root would be a warning 
message of some sort. (As always, if people think something like this 
would be worthwhile, we can always consider funding the work.)

Frank

-- 
Frank Hecker
[EMAIL PROTECTED]
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to