Frank Hecker wrote: > I'm not sure what you mean by "cosmetically", With "cosmetic" I mean that nothing prevents a CA to establish the needed OID chain NSS will be looking for. There is (almost) no difference between issuing an intermediate CA certificate and issuing one with the needed OID. This is what I wanted to have confirmed explicitly by somebody else then me! > but you are correct that > once we approve a root for EV then the root can create EV-capable > subordinate CAs at will, and we don't currently have the fine-grained > control in NSS that would allow overriding that if needed or wanted > (e.g., if we want to deny one particular subordinate the ability to > issue EV certs). > Which raises at least with me the question, if this is indeed what was envisioned when Mozilla decided to endorse EV as a better PKI model. Or are people like Kyle perhaps rightfully thinking that he's being cheated on by some CAs? I'm quoting a recent statement by Kyle:
"The end result is that anyone who chooses to spend a hundred thousand bucks or so on a single audit can then go around selling the benefit of their inclusion in the trust list to the highest bidder without fear of repercussion. Which is what they've been doing. And nobody has the balls to stand up and say "user security is more important than user convenience". (In addition, roots have been sold to other companies, which have not passed continuing conformance audits.)" It seems to me, even so I believed that EV will change that, nothing will change in that respect, specially the vetting of the issuing CAs. This was one of the arguments mentioned here in favor of EV. I'd have to go through the archive of the discussions, but I'm almost certain that the audit argument was brought up various times. Now I'm asking the question, is this really what we wanted? Is this the better criteria and standard, the better auditing principals? As we are reviewing possible changes to the Mozilla policy, one of the possible suggestions I'll be making will most likely be, that CAs must have established (provable) direct control over their subordinated CAs. Another idea could be that external sub CAs would have to be audited in the same manner as the parent CA. In relation to EV, we could perhaps include only the issuing, intermediate EV CA certificate which was actually audited (since they have a path length of 0, this could guaranty that only the audited and approved CA is issuing EV certificates). There are many options possible obviously and I'm just brainstorming right now. -- Regards Signer: Eddy Nigg, StartCom Ltd. <http://www.startcom.org> Jabber: [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]> Blog: Join the Revolution! <http://blog.startcom.org> Phone: +1.213.341.0390 _______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto