* Eddy Nigg:

> On 01/22/2009 11:04 AM, Florian Weimer:
>> * Eddy Nigg:
>>
>>> As a matter of fact, most CAs have policies in place which require
>>> them upon knowledge of potential or *suspected* compromise to revoke
>>> ANY certificate. I'm certain those policies exist for the top CAs
>>> covering the majority of certificates. The keys are compromised, not
>>> only suspected to be compromised. It's known which keys and
>>> certificates are affected (by the CAs themselves).
>>
>> Yes, but we don't know all the CAs that exist and are recognized by
>> Mozilla. 8-(
>
> Of course we know. It's right here:
> http://lxr.mozilla.org/mozilla/source/security/nss/lib/ckfw/builtins/certdata.txt

The list doesn't include sub-CAs, which are equivalent to listed CAs
for all practical purposes.  It's also difficult to match the blobs to
legal entities ("Equifax" comes to my mind).

>> If you've got a sub-CA under a browser-listed root CA, it's kind of
>> hard for Mozilla or the root CA to enforce any rules (let alone detect
>> violations).
>
> No it's quite easy to do that.

For Mozilla?  How so?

>> What about requiring that all certificates must be published by the CA
>> (including sub-CAs)?
>
> I don't know the benefit for it,

Transparency.  You can actually check what's in those CRLs and what
kind of mistakes are being covered up.

> but I guess that sub CAs could be published, end-user certificates
> most likely not.

Why not?
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to