Nelson Bolyard:
> Eddy, I haven't pushed for the inclusion of any CA or any CA cert.
>   
OK Nelson, again I apologize for any inconvenience my previous post may 
have caused you.
> Then I went and looked at the "pending" page,
> http://www.mozilla.org/projects/security/certs/pending/index.xml
> And saw lots of color coded information there.  Personally, I found the
> particular presentation on that page to be difficult to quickly grasp.
>   
Mhhh, I like it actually...
> 1) When I look at the bugzilla bug list of open root CA requests, at 
> https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&product=mozilla.org&component=CA+Certificates&bug_status=UNCONFIRMED&bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&bug_severity=enhancement&chfieldfrom=2004-04-01&chfieldto=Now&chfield=%5BBug+creation%5D&cmdtype=doit
>   
>
>   
I added this to my saved searches, really useful!
> 3) It had the predictable effect of causing a number of those CAs to respond
> saying (in effect) "Oh, our application is incomplete? What are
> we missing?"  IMO, that was useful to get the process moving for them
> again.
>   
That's most likely due to missing manpower (from Mozilla side) and them 
not following up on their bugs....
> 4) It also had the effect of causing Frank to notice that some of that info
> was out of date, and so there were some immediate updates to the Pending
> page.  I then carried those updates to the bugzilla bugs.
>   
OK
> 5) I think there are still some discrepancies.  For example, the Pending
> page says that bug 335197 "Add KISA root CA Certificate" is in "public
> discussion" state, but after studying the bug, I conclude that it is NOT
> yet in that state.  Frank's most recent comment suggests he has more
> review to do on it.  I think the "Information Probably Complete" state
> is more accurate for that request.
>   
Yes, it might be that this bug needs to be tagged differently now. I'm 
not sure, since we are either waiting for them or for Frank...?
>
> Apart from this "book keeping" task that I have done, I have no more
> control over the request evaluation process than you do.
>   
:-)
> I think Mozilla desires to maximize the number of issued certs that will be
> recognized as valid by FF3 when it ships, in order to minimize the number
> of complaints from FF3 users about their favorite site's certs being
> unrecognized.  I think that has led to an approximate ordering of the
> requests from biggest (most certs issued) to smallest (least certs issued),
> and from requests that take the least time to evaluate to those that take
> the most time to evaluate.
>   
Yes, this makes sense...
> It appears to me that each request to add a new cert (or certs) for a CA
> whose certs are not already in the list takes roughly the same amount of
> time to evaluate, whether that CA serves tens of certs or thousands of
> certs.  It appears to me that the requests to give EV approval to certs
> already in FF's root list takes much less time to evaluate than requests
> for certs not yet included in the list.
Correct.
>   So, it wouldn't surprise me at
> all to see that priority is given to the requests for upgrading certs that
> are already in the list.
>   
I think this is what Frank actually did. The upgrades were preferred 
over the ones which had new roots to include.
>
> If I'm right that Mozilla has chosen to order the requests in decreasing
> order by number of certs issued (or equivalently, https server market share)
> I think it would be good for Mozilla to publish that fact.
No, generally speaking I don't believe that this is the case...I think 
that would be a wrong statement and Mozilla doesn't have to publish 
something like this.


-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to