Nelson B Bolyard:
> I am confident that removing the email trust flag from the Entrust root
> that cross certified the Diginotar root key would effectively stop certs
> issued by Diginotar from being treated as valid email certs.  This is the
> only method in which I am confident, today.
>
> We have entertained the idea that NSS could actively distrust an
> intermediate CA cert for a certain usage (such as email), even if its
> issuer was trusted for that usage. But today I am NOT confident that any
> presently-released version of NSS correctly and effectively implements
> that active distrust.  (I could test that in a day or two if I had an
> appropriate and relevant cert chain with which to test.)
>
> I agree with others who have expressed the idea that Mozilla really should
> get Entrust to step in and address this problem.  If, at some point, they
> revoke their old cross cert, and Mozilla products continue to honor the
> revoked cert because of revocation deficiencies in NSS, then that would
> be a problem on our shoulders, but I do not think our first action should
> be one that presumes that Entrust will not do that, nor should it be one
> that relieves Entrust of any obligation or motivation to take that action.
>

Another question is, what happens if the cross-signed certificate is 
revoked AND NSS recognizes the revocation. Would this effectively have 
the DigiNotar root show up as revoked? Not sure what will happen but 
it's a possibility and something we most likely don't want after all.


-- 
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to