Uhm...

how did you arrive at the "tens of thousands of other Comodo
customers" figure?  I don't believe that Comodo has disclosed the
number of unique domain names served by certificates that it has
issued.

And since the number one reason for having a CA in the root list is
for Mozilla-software user security, how do you arrive at "punish [...]
millions of users"?

TLS is geared very obviously toward security-of-the-user (among other
things, a server that does not provide a certificate cannot ask for
client authentication), and the user is who we're trying to protect
(since the user is the one who interacts with Mozilla apps) -- NOT the
server.

As far as I can tell, there is no easy way for users to self-identify
whether the web sites that they're going to are using Comodo
certificates.  As far as I can tell, there is no reporting of what CAs
are used by sites browsed to by any given installation of Mozilla
software.

This leads me to believe that there are three possibilities:

1) You have communication from Robin about the number of certificates
that Comodo has issued that the rest of us are not privy to, OR
2) You have some way of knowing what CAs are in use by the servers
that users of the Mozilla applications use (which concept rather
scares me, since it hasn't been disclosed as part of the software
operations), OR
3) You're pulling numbers out of thin air.

-Kyle H

On Sun, Dec 28, 2008 at 11:41 PM, Grey Hodge <g...@burntelectrons.org> wrote:
> On 12/28/2008 9:42 AM Eddy Nigg cranked up the brainbox and said:
>> On 12/28/2008 04:24 PM, Ian G:
>>> No, I'm afraid there is an agreement to list the root, under a policy.
>>> Once listed, Mozilla has to operate according to its side of the bargain.
>> Apparently you are reading something I haven't.
>
> Apparently, but that doesn't mean it's invalid. Mozilla can't act arbitrarily
> and without cause and expect to retain any shred of respect or
> trustworthiness. A policy not adhered to is worthless.
>
>> That's for the specific certstar case. Domain validation isn't performed
>> by Comodo on a wide scale apparently and perhaps no validation is
>> performed at all.
>
> Yes, perhaps, and perhaps they send out certs to anyone who asks nicely, but
> we have little evidence to support these suppositions.
>
> Rather than having a kneejerk reaction of removing Comodo from the root list,
> why don't we examine the situation. This reseller was not acting according to
> proper procedure. Comodo immediately revoked their reseller status, and
> reviewed their certs. Further, they've said they're reviewing their policies
> to ensure this doesn't happen again. Given their candor and quick response,
> what more do you require that you feel you're not getting that justified
> removing them as a root CA?
>
> I really think you're going overboard. Form what I see, I'm not alone in that
> assessment. You did a good job in bringing this to light. Having the issues
> you uncovered addressed and fixed should be sufficient. Why do we need to take
> punitive action that will do nothing but punish tens of thousands of other
> Comodo customers and millions of users?
>
> --
> Grey Hodge
>  email [ grey @ burntelectrons.org ]
>  web   [ http://burntelectrons.org ]
>  tag   [ Don't touch that! You might mutate your fingers! ]
>  motto [ Make everything as simple as possible, but no simpler. - Einstein ]
> _______________________________________________
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to