The only effective and appropriate response to a root that does not
have sufficient internal controls to maintain its own security is to
remove the trust in it.  If you've purchased a certificate from them
because it's trusted, and then they lose that trust, I would think
that you should be clamoring for your money back and looking for an
alternate certificate issuer rather than trying to maintain the
problem.

-Kyle H

On Tue, Dec 23, 2008 at 12:44 PM,  <doug...@theros.info> wrote:
> On 23 dez, 18:23, Daniel Veditz <dved...@mozilla.com> wrote:
>> Frank Hecker wrote:
>> > Eddy Nigg wrote:
>> >> Disabling the trust bits of "AddTrust External CA Root" could be a
>> >> temporary measure to prevent damage to relying parties
>>
>> > Also note that any "suspension" of a root would last at last 1-3 months,
>> > since that the typical interval between security updates for Firefox and
>> > other Mozilla-based products.
>>
>> And we don't have a magic switch we can flip in the office. We'd have to
>> make the change, test the change, make the builds, ship the builds,
>> users would have to update (about a week from ship until most users have
>> the update).
>>
>> If the sole purpose of the update was to break lots of sites (from the
>> user's POV) then some number of them disable updates, making them less
>> secure in the future.
>>
>> If Comodo is acting in good faith then anything they can do would be
>> lightyears faster than a client update. If they're not fulfilling their
>> responsibilities then a permanent removal would make sense, but given
>> the time scales it's hard to see how a "temporary" month-or-so removal
>> helps.
>>
>> Maybe we need to build in something like a CRL that pings back to
>> Mozilla that would let us revoke roots without having to ship a client
>> update.
>
> I, for example, have a ssl cert from comodo reseller, and they DO have
> made all the validation steps.
>
> My site, a legitimate one, would be in trouble with this. Are you all
> sure that it is a good measure to just knock off the root cert or
> security bit?
>
> please, think twice
> _______________________________________________
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to