If things have deteriorated to the point where the political hands are
tied, and the only way to get things done is to just make a change in
the code...

...how is the political structure helping the coders?  Or anyone else?

-Kyle H

On Mon, Jan 12, 2009 at 1:23 PM, Ian G <i...@iang.org> wrote:
> On 12/1/09 22:03, Kyle Hamilton wrote:
>>
>> On Mon, Jan 12, 2009 at 5:59 AM, Rob Stradling<rob.stradl...@comodo.com>
>>  wrote:
>>>
>>> On Monday 12 January 2009 13:30:35 Kyle Hamilton wrote:
>>>>
>>>> I believe that this is not only exactly what he is saying, but also
>>>> exactly what must be done.
>>>>
>>>> Once a "potentially problematic practice" is shown to have moved from
>>>> "potential" to "actual", it is a problematic practice.  Once that
>>>> happens, it must be addressed.
>>>
>>> I fully agree.
>>>
>>> Right now, as I see it, we have...
>>> 1). "potential" - The "Potentially Problematic Practices" wiki page.
>>> 2). "actual" - The Mozilla CA Certificate Policy.
>>>
>>> So when a problem "is shown to have moved from 'potential' to 'actual'",
>>> surely the way to address it would be to update the Mozilla CA
>>> Certificate
>>> Policy and require CAs to conform to the new version (or risk having
>>> their
>>> Root(s) pulled) ?
>>
>> I am inclined to agree.
>
>
> In principle, yes.  Which is to say, Problematic Practices aren't of any
> weight, they are just hints as to what sticky questions a CA is going to
> receive.
>
>
>> Investigating along these lines, what would the procedure be for
>> getting Mozilla to update the Certificate Policy with explicit
>
>
> (Note freudian slip above, it's CA Policy... :)
>
>
>> algorithm acceptance/deacceptance policies?
>
>
> First figure out whether it is a good idea.  I'm "-1" on that.  This is CA
> business, not Mozo business.  It is what CPS/CPs are for.
>
> Now, I for one do not disagree with the core frustration of the people here.
>  But, replacing the CPS/CP function of a CA is not a good idea.
>
> To start telling the CA what hash functions to use is to change the PKI.
>  The CPS tells the relying party what it does, that's its job. Reference,
> Chokhani:
>
> ===============
> 4.6.1.  Key Pair Generation and Installation
>
>   Key pair generation and installation need to be considered for the
>   issuing CA, repositories, subject CAs, RAs, and subscribers.  For
>   each of these types of entities, the following questions potentially
>   need to be answered:
> ...
>   5. What are the key sizes?  Examples include a 1,024 bit RSA modulus
>      and a 1,024 bit DSA large prime.
> ===============
> http://tools.ietf.org/html/rfc3647#section-4
>
> Although it doesn't say it, it is hard to conclude otherwise.
>
>
>> Putting aside political arguments (and everything related to policy is
>> political), I think that this situation could perhaps be better fixed
>> simply by stating "you can create certificates using any algorithm you
>> want, but we're not going to allow your MD5-signed certificates to
>> verify with our software".
>
>
> Right.  No change needed, just do it.
>
>
> iang
> _______________________________________________
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to