On 23 dez, 18:23, Daniel Veditz <dved...@mozilla.com> wrote:
> Frank Hecker wrote:
> > Eddy Nigg wrote:
> >> Disabling the trust bits of "AddTrust External CA Root" could be a
> >> temporary measure to prevent damage to relying parties
>
> > Also note that any "suspension" of a root would last at last 1-3 months,
> > since that the typical interval between security updates for Firefox and
> > other Mozilla-based products.
>
> And we don't have a magic switch we can flip in the office. We'd have to
> make the change, test the change, make the builds, ship the builds,
> users would have to update (about a week from ship until most users have
> the update).
>
> If the sole purpose of the update was to break lots of sites (from the
> user's POV) then some number of them disable updates, making them less
> secure in the future.
>
> If Comodo is acting in good faith then anything they can do would be
> lightyears faster than a client update. If they're not fulfilling their
> responsibilities then a permanent removal would make sense, but given
> the time scales it's hard to see how a "temporary" month-or-so removal
> helps.
>
> Maybe we need to build in something like a CRL that pings back to
> Mozilla that would let us revoke roots without having to ship a client
> update.

I, for example, have a ssl cert from comodo reseller, and they DO have
made all the validation steps.

My site, a legitimate one, would be in trouble with this. Are you all
sure that it is a good measure to just knock off the root cert or
security bit?

please, think twice
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to