At 7:58 PM -0800 2/12/09, Nelson B Bolyard wrote:
>Recently, a CA that uses partitioned CRLs applied to admission to
>the Mozilla/NSS root CA list.  Our choices appear to be:
>
>1) Do not admit their root until support for partitioned CRLs is done.
>(There is no active plan of record to do that work at this time.)
>2) IF they also support OCSP, admit them on that basis
>3) If not, admit their root anyway, knowing that their CRLs will not
>work with NSS, not even when CRLDP work is done.
>
>I think the last option is not a good choice.  I'm OK with either of
>the others.  The responses I've seen don't seem to clearly indicate
>which of the above 3 choices are acceptable.

A Mozilla policy that says "we allow trust anchors for which we cannot do 
revocation checking" seems wrong. #2 seems fine to me. So does #1, although I 
would not want that policy to accelerate the implementation of partitioned CRLs 
unless we see many other CAs using them.
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to