Eddy Nigg wrote:
On 02/05/2009 04:05 AM, Frank Hecker:
* In the near term I think we should make it a recommended practice that
CAs should revoke certificates whose private keys are known to be
compromised, as well as certificates for which subscriber verification
is known to be invalid.

Well, a recommendation is just what it is I guess...

I want to start with a recommendation, but not end with it. I want to use the recommendation for two purposes:

* to have Kathleen start actively checking CPSs for revocation language
* to fine-tune the exact language in which we want to state a policy requirement

There are likely some ambiguities and corner cases we need to worry
about, which is one reason why I'd like us to first get some experience
with what CAs are actually putting in their CPSs.

If however you intend to have any effect on the desired behavior, than Mozilla must make those things a requirement.

I agree. I think this is a case where it definitely makes sense to have this be a requirement. I also think the case of revocation on key compromise is relatively clear, and I don't anticipate any major problems finding policy language to deal with it.

However I'd also like us to consider including a requirement that CAs revoke certificates when it's clear that validation of subscribers was not done or was done wrong, like in the Comodo/CertStar problem or your StartCom bug. I don't quite know right now exactly how to word such a requirement properly, and I'd like to "beta-test" some language and see how it compares to what CAs are claiming in CPSs.

Or Mozilla must create by-laws to the policy which may change more frequently.

I think it is certainly reasonable to update the policy on an annual basis, and I think that should be our minimum target. We could also update it more frequently, but I don't want to be modifying it on a monthly basis.

Frank

--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to