* Eddy Nigg:

> As a matter of fact, most CAs have policies in place which require
> them upon knowledge of potential or *suspected* compromise to revoke
> ANY certificate. I'm certain those policies exist for the top CAs
> covering the majority of certificates. The keys are compromised, not
> only suspected to be compromised. It's known which keys and
> certificates are affected (by the CAs themselves).

Yes, but we don't know all the CAs that exist and are recognized by
Mozilla. 8-(

If you've got a sub-CA under a browser-listed root CA, it's kind of
hard for Mozilla or the root CA to enforce any rules (let alone detect
violations).

What about requiring that all certificates must be published by the CA
(including sub-CAs)?
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to