On Tue, Apr 1, 2008 at 11:15 AM, Frank Hecker
<[EMAIL PROTECTED]> wrote:
>
>  In the thawte case you cite, thawte changed its practices to start
>  issuing DV certs from a CA hierarchy not previously used for that, but
>  its practices were still within boundaries outlined in our policy (which
>  does allow issuance of DV certs). So I don't really see a security issue
>   here in terms of how this would affect typical users.
>

Great.  I certainly hope this is an April Fool's joke, but I have to
proceed on the basis that it's not.  So...

Please tell me how to completely disable all Mozilla Foundation
included CAs without having to individually change the trust settings
on all of them?  I can't trust Mozilla's certificate policy to protect
my interests -- I can't trust Mozilla's policy to ensure that
strictures that I originally relied on in the certificate issuance
policies haven't been relaxed, thus compromising my own ability to
trust the certificate issuers involved.

Alternatively, please tell me how I can auto-accept any presented root
certificate in Firefox?  It seems I have exactly two levels for trust
here:  I can either do due diligence and examine the certificate
issuance policies of each and every vendor every time I get a
certificate issued by them (since, as the Thawte example shows,
certificate policies can change for the worse at any time with no
direct information of people who would otherwise rely on their
certificates), or I can accept anything on the concept that the only
reason I as a user would need to know about it is if I were going to
pass my credit card information to someone who shouldn't have it --
but since there's no liability or exposure to me from my credit card,
I don't need to worry about it.

What's the functional, least-astonishing difference between
domain-validated certificates not intended for commerce, and
higher-integrity certificates intended for commerce?

What extension exists to mark a certificate as being DV?  What
extension exists to mark a certificate as being intermediate
validation?

How can I, as a user, determine if a certificate is DV versus IV or OV
or EV without having to fight the user interface to find the
information?

I've seen DV certs being used on sites that ask for commercial
information.  The problems exist -- and you're hiding behind a
(demonstrably broken and problem-laden) policy to ignore all the
problems.

So, I want to opt out of relying on your policy, and I want to opt out
of these strictures which serve only to maintain the dominance of a
market sector which exists only for the purposes of extortion from
people who want to try to do the Right Thing[tm].

-Kyle Hamilton
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to