I am leading the effort to create a policy and a process for removing
a Certification Authority root certificate from distribution in
Mozilla products, and I would greatly appreciate your input and
feedback on the following.

Wiki page for ideas about the process and policy:
https://wiki.mozilla.org/CA:Root_Removal_Policy_Notes
Adding your input/comments/suggestions directly to the wiki page is
greatly appreciated, but please don’t delete anything.

DRAFT text for the Policy:
http://www.mozilla.org/projects/security/certs/removal-policy/

Note that I am operating under the assumption that there is currently
no way in NSS to mark a root certificate as “untrusted”. Please let me
know if this assumption is incorrect.

As you will see in the notes and draft policy, there is consideration
for deprecating a root by unsetting the trust bits (websites, email,
code), and of completely removing the root certificate from NSS.

If it would be reasonable to mark a root cert as “untrusted” in NSS,
we could also consider this option... If a root were to be
compromised, and marked as untrusted, it could be treated as though
all of the trust bits are unset, and not allow the user to set any of
the trust bits. This would be safer than removing the root from NSS,
because it would prevent the user from importing and trusting the
root.

I look forward to your constructive input on the creation of this
policy and process.

Kathleen
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to