Wowowow, slowly! Nelson, I didn't meant to attack you in any way. I 
apologize if this what you understood from my previous post!

-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 



Nelson Bolyard:
> Eddy Nigg (StartCom Ltd.) wrote, On 2008-03-05 11:01:
>
>   
>> Second I wonder what's the deal with Thawte's and GeoTrust's inclusion 
>> requests. As Gerv mentioned yesterday, there are about 40 others in the 
>> queue, why do they get a preferential treatment? Others wait for half a 
>> year and more just to get to this stage? I saw the entries in the bugs 
>> from Nelson pushing for their inclusion... 
>>     
>
> Eddy, I haven't pushed for the inclusion of any CA or any CA cert.
> Let me tell you what I have done for the CA request queue this week.
>
> Recently, I received emails from representatives of a number of CAs,
> all asking "what is the status of our CA cert request?"  I looked at
> their bugs in bugzilla, and for some of them, I myself could not figure
> it out from the information in the bug reports.  Then I went and looked
> at the "pending" page,
>    http://www.mozilla.org/projects/security/certs/pending/index.xml
> And saw lots of color coded information there.  Personally, I found the
> particular presentation on that page to be difficult to quickly grasp.
>
> I wanted, but did not find, a summary table.  So I made one, using bugzilla.
> I took the status information in the pending page and updated the
> individual bugzilla bugs with it.  For every CA listed on the pending page
> whose request bug is still open, I updated it with the status from the
> pending page.  I also changed the bug summaries of (nearly all) those bugs
> to have a similar concise syntax, so one can see at a glance which CA is
> the subject of the bug, and whether the request is for EV, or not.
> This had several immediate effects.
>
> 1) When I look at the bugzilla bug list of open root CA requests, at
>   
>> https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&product=mozilla.org&component=CA+Certificates&bug_status=UNCONFIRMED&bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&bug_severity=enhancement&chfieldfrom=2004-04-01&chfieldto=Now&chfield=%5BBug+creation%5D&cmdtype=doit
>>     
>
> I now immediately see the status information of every bug.  To do that,
> I view these columns: ID, (Date) Opened, Whiteboard, Full Summary.
> The whiteboard column now shows the status info.  I can now easily see
> that 18 of the 42 open requests have no status information because they
> are NOT yet listed on the pending page.
>
> 2) I noticed that quite a few CAs listed on the Pending page have had
> their requests completely resolved, either by having their certs included,
> or by being rejected.  I would like to see the entries for the CAs that
> are now included moved from the pending page to the "included" page,
>    http://www.mozilla.org/projects/security/certs/included/index.xml
> and I'd like to see another new page that lists the negatively resolved
> requests.
>
> 3) It had the predictable effect of causing a number of those CAs to respond
> saying (in effect) "Oh, our application is incomplete? What are
> we missing?"  IMO, that was useful to get the process moving for them
> again.
>
> 4) It also had the effect of causing Frank to notice that some of that info
> was out of date, and so there were some immediate updates to the Pending
> page.  I then carried those updates to the bugzilla bugs.
>
> 5) I think there are still some discrepancies.  For example, the Pending
> page says that bug 335197 "Add KISA root CA Certificate" is in "public
> discussion" state, but after studying the bug, I conclude that it is NOT
> yet in that state.  Frank's most recent comment suggests he has more
> review to do on it.  I think the "Information Probably Complete" state
> is more accurate for that request.
>
> In any case, none of this work was "pushing" any particular CAs for
> inclusion.  My motivation was enable anyone to see, at a glance, what
> stage each request is in, and which requests have gotten an initial
> examination and which ones have not, and thereby make it easier to
> differentiate certs that are truly in process from those that are not.
>
> Apart from this "book keeping" task that I have done, I have no more
> control over the request evaluation process than you do.
>
>   
>> I understand the need for FF3 to support as many EV enabled roots as 
>> possible, it simply doesn't look good! And what would happen if these 
>> roots would be included and published during one of the next updates of 
>> FF3? Would there be really such a de-valuation of FF3 if they'd have to 
>> wait a little?  
>>     
>
> As an observer of the process, here's what I think (opine, speculate) is
> going on.
>
> I think it's safe to say that the backlog of root CA requests will not
> have been entirely cleared by the time FF3 ships.  So, some sort of
> ordering or prioritization of those requests seems logical.  One possible
> order is First-In-First-Out, and that obviously isn't the order being used.
>
> I think Mozilla desires to maximize the number of issued certs that will be
> recognized as valid by FF3 when it ships, in order to minimize the number
> of complaints from FF3 users about their favorite site's certs being
> unrecognized.  I think that has led to an approximate ordering of the
> requests from biggest (most certs issued) to smallest (least certs issued),
> and from requests that take the least time to evaluate to those that take
> the most time to evaluate.
>
> It appears to me that each request to add a new cert (or certs) for a CA
> whose certs are not already in the list takes roughly the same amount of
> time to evaluate, whether that CA serves tens of certs or thousands of
> certs.  It appears to me that the requests to give EV approval to certs
> already in FF's root list takes much less time to evaluate than requests
> for certs not yet included in the list.  So, it wouldn't surprise me at
> all to see that priority is given to the requests for upgrading certs that
> are already in the list.
>
> Those are my observations and educated (?) guesses.
>
> For those CAs' requests that have reached the "Information Confirmed
> Complete" state, I would like to see them be processed in more-or-less
> FIFO order from the time at which they reach that state.  But I am
> sympathetic to the desire to maximize the number of certs that will work
> for FF3 users.
>
>   
>> Are the suspicions and rants on this mailing list by some participants 
>> justified then? I'm always pointing out and praising in the public about 
>> the professional, transparent, clean and fair process a CA undergoes for 
>> inclusion at Mozilla. I wouldn't know what to say to somebody 
>> complaining about this one...
>>     
>
> If I'm right that Mozilla has chosen to order the requests in decreasing
> order by number of certs issued (or equivalently, https server market share)
> I think it would be good for Mozilla to publish that fact.  I believe that
> it is always wise to set people's expectations in line with the most likely
> outcomes.  Better they should know what to expect than simply be in the
> dark, IMO.
> _______________________________________________
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>   

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to