On 26/12/08 22:38, Kyle Hamilton wrote:
See, Robin, my thought is this:

You've already shown that it's possible for the RA function to bypass
all controls.  At this point, because they're not subject to the same
audits that Comodo is, and because the last WebTrust audit that anyone
here can find any record of is in 2007, I find it difficult to believe
that you have the "annual external audit".

The internal controls are supposed to prevent this kind of
mis-issuance.  Because they didn't, they throw all the audits that you
have provided into doubt.  Because of this, there is no trust that I
have in Comodo's operation.



The internal controls are not supposed to "prevent mis-issuance". This is a gross consumer simplification, and has no place here. The controls are meant to reduce the likelihood of them, make them discoverable, and deal with them when they happen.

We can no more "prevent" bad certs than we can stop the winter from coming. The point is to put in place economically reasonable policies and practices that meet an appropriate balance of security versus cost.

If there has been a case where a particular instance has swayed and delivered too much convenience, for too high a security risk, then the systems will deal with it.

So far the systems are dealing with it. Check the facts: CA was notified. Reseller frozen. Certs revoked. Internal audits are checking. External audit might get involved. This is what the systems are supposed to do.



To all: Although we might in other contexts promote the use of open forums for open governance purposes -- analysis and discussion of the properties of providers by open parties -- *this public lynching is not that*.

It is neither informed, nor professional.

Mozilla runs a process where there is a one week period of public scrutiny of a CA. During that time, we could reasonably argue that people here are invited to state their fears. We might consider discussions to be more "priviledged" such as in parliament.

However, outside that week, there is no such protection. Where people in this group have crossed the line, and made actionable statements, and/or done actionable harm to a business or individual, they should note: it is unlikely that Mozilla, or the community, or the businesses as a whole will, can or should protect them. And where corporates are forced to be quiet for fear of reputational damage, then it is up to the rest of us to seek professionalism and self-governance.



The process of recovery from this hack is not an open nor public process. CAs, as businesses, and audits, as governance are not generally public affairs.

If you wish to advance these into the open, by all means do, but first, establish a policy and a practice. Let's establish guidelines on reasonable behaviour so that criticism can be seen in a narrow context, and can be protected and informed.

Elsewise, it is unbalanced. You can talk unprofessionally, but others are forced to remain silent. Any comments are wasted, discussion is fruitless at best, and at worst, the mob will have their way.



iang
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to