On Monday 12 January 2009 20:28:25 Eddy Nigg wrote:
> On 01/12/2009 09:20 PM, Paul Hoffman:
> > No, because it is not true. What is true is that signing with MD5 is now
> > considered to be insecure, and what Mozilla will do about it.
> >
> >> Should every possible algorithm be listed there too?
> >
> > Probably, yes. That is, every allowed signing algorithm should be listed;
> > we obviously don't need a list of the non-allowed algorithms.
> >
> >> Does your CA policy and practice statements list any algorithm you don't
> >> intend to use for the same reasons?
> >
> > We should not be relying on CA's CPSs: we should be relying on our own
> > view of what is good-enough security.
>
> This was a question directed to Rob, not Mozilla :-)

Eddy, I do think that the Mozilla CA Certificate Policy should cover 
*all* "actual" problematic practices.  In this particular case, I think that 
a blacklist of unsupported/non-allowed/not-recommended algorithms and/or a 
whitelist of supported/allowed/recommended algorithms would be very useful 
information for the CAs.

If Mozilla ever does decide to pull a CA's Root for whatever reason, wouldn't 
it be so much better if Mozilla could say to them...
  "CA X, you have no excuse.  You have clearly violated clause N of version 
Y.Z of the Mozilla CA Certificate Policy, which you had previously agreed to 
adhere to"
...rather than...
  "CA X, you took your eyes off the ball.  You really should have been 
following all of the discussions on mozilla.dev.tech.crypto more closely and 
assuming that any opinion expressed might become Mozilla's official policy at 
any moment.  And you really should have assumed that violating 
any 'potentially problematic practice' could give us cause to pull your Root 
at any time"
?

To put it simply: I would really like Mozilla's expectations of the CAs to be, 
on an ongoing basis, 100% clear.

> >> Or supposed Mozilla deems certain practices in relation to RAs and/or
> >> intermediate CAs an unnecessary risk and problematic, does this have to
> >> be explicitly stated in the Mozilla CA Policy?
> >
> > Yes.
> >
> >> If yes, what else must be stated there or is the intend of the policy
> >> clear enough?
> >
> > Everything that we know that some CAs might do wrong that is not
> > acceptable to Mozilla should be listed there. As we discover new
> > categories (in this case, "uses unsafe algorithm"), it should be added.
> > That list is not going to be long, but it *will* be valuable.
>
> OK, I'm not sure if this is/was the intention of Frank and the
> objectives of the Mozilla CA Policy.
>
> Nevertheless I suggest to start the work for a possible change to the
> policy in order to address those issues now. Changes have been made to
> the policy within relative short time in order to address EV, it's
> entirely possible to get it accomplished with reasonable effort and
> useful time-frame.



-- 
Rob Stradling
Senior Research & Development Scientist
Comodo - Creating Trust Online
Office Tel: +44.(0)1274.730505
Fax Europe: +44.(0)1274.730909
www.comodo.com

Comodo CA Limited, Registered in England No. 04058690
Registered Office:
  3rd Floor, 26 Office Village, Exchange Quay,
  Trafford Road, Salford, Manchester M5 3EQ

This e-mail and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to whom they are addressed.
If you have received this email in error please notify the sender by replying
to the e-mail containing this attachment. Replies to this email may be
monitored by Comodo for operational or business reasons. Whilst every
endeavour is taken to ensure that e-mails are free from viruses, no liability
can be accepted and the recipient is requested to use their own virus checking
software.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to