On 12/28/2008 04:24 PM, Ian G:
1. Certs: All end-users who rely on these certs will lose. That probably
numbers in the millions. All subscribers will lose, probably in the
thousands. The CA will lose; potentially it will lose its revenue
stream, or have it sliced in half (say), which is what we would call in
business circles a plausible bankrupcy event.

Not relevant.


Well! If they are not relevant, then perhaps we can turn SSL off, with
no consequences?


I was clearly replying to the later part:

The CA will lose; potentially it will lose its revenue stream, or have it sliced in half (say), which is what we would call in business circles a plausible bankrupcy event.

It's not relevant.


No, I'm afraid there is an agreement to list the root, under a policy.
Once listed, Mozilla has to operate according to its side of the bargain.


Apparently you are reading something I haven't.

The problem being, that even if it reserves the right to make a choice
for any reason, this does not give Mozilla carte blanche.

Mozilla can make a bad decision, no doubt. This case is most likely not one of those you are referring to.


Please read it carefully. a root being dropped by a BAD decision.

A root isn't removed before careful considerations. A bad decision doesn't warrant not to remove any roots at all if necessary. Mozilla can also reinstate a root.


They stated how many, IIRC. I recall it was something like 111 certs
issued and 11 outstanding that had not been re-verified within around 48
hours (these numbers are not accurate, but indicative) and were
therefore revoked.

That's for the specific certstar case. Domain validation isn't performed by Comodo on a wide scale apparently and perhaps no validation is performed at all.


--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: start...@startcom.org
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to