On 12/29/2008 3:47 AM Kyle Hamilton cranked up the brainbox and said:
> And since the number one reason for having a CA in the root list is
> for Mozilla-software user security, how do you arrive at "punish [...]
> millions of users"?

If all of Comodo's certs cease to be trusted, millions of web surfers will see
errors on potentially thousands of sites.

> This leads me to believe that there are three possibilities:
> 1) You have communication from Robin about the number of certificates
> that Comodo has issued that the rest of us are not privy to, OR
> 2) You have some way of knowing what CAs are in use by the servers
> that users of the Mozilla applications use (which concept rather
> scares me, since it hasn't been disclosed as part of the software
> operations), OR

The fact you think these are even reasonably conclusions tells me a lot about
your reasoning skills.

> 3) You're pulling numbers out of thin air.

Indeed, I am, as an educated guess. Comodo is a root CA. You don't get root
status by having a handful of customers. It's hard business to break into, and
Comodo has been around a while. I find it hard to believe a company of their
size and age has any fewer than ten thousand certs out there, and that's a
lowball guess. There are many hundreds of millions of web users, and millions
of websites. Do you really find it hard to believe at least 1% of those secure
sites might be using a Comodo cert?

-- 
Grey Hodge
 email [ grey @ burntelectrons.org ]
 web   [ http://burntelectrons.org ]
 tag   [ Don't touch that! You might mutate your fingers! ]
 motto [ Make everything as simple as possible, but no simpler. - Einstein ]
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to