* Paul C. Bryan:

> Presumably it was Comodo that underwent an audit to be added to
> Mozilla's roots, and Comodo should not be allowed to delegate trust to
> their resellers for domain validation. If, today, trust is delegated
> to their resellers, then we can't trust Comodo, period.

Many of the historic root CAs have a forest of sub-CAs and RAs which
are totally undocumented.  By your argument, they should be removed as
well.

Mozilla started to require CPS for sub-CAs only recently.  I don't
know if this is part of a larger effort to clean up this mess, or was
some sort of an ad-hoc decision to make things hard to for a
particular CA to get added to the root CA list.

Personally, I don't care that much about the root CA list because it's
quite clear to me that browsing security does not rely on it.
However, if Mozilla went EV-only (which is probably what's favored by
some CAs), many users would be warned about sites which are perfectly
safe to use.  Those operators who wanted to avoid the confusion would
have to pay higher road tolls for no real security gains.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to