On 09/26/2009 02:39 AM, Kathleen Wilson:
If it would be reasonable to mark a root cert as “untrusted” in NSS,
we could also consider this option... If a root were to be
compromised, and marked as untrusted, it could be treated as though
all of the trust bits are unset, and not allow the user to set any of
the trust bits. This would be safer than removing the root from NSS,
because it would prevent the user from importing and trusting the
root.

I think NSS/PSM needs to have an option to completly disable the possibility to turn the trust bits on - specially for compromised roots. At least the UI in FF/UI should remove the edit flags for those roots. For example the MD5 CA cert derived from the GeoTrust root should not be open to editing. Perhaps we could "fix" this at two different levels, it seems to me that a fix in PSM would be easier and faster to implement. Later maybe some functionality could be added to NSS to prevent enabling a compromised root.

--
Regards

Signer:  Eddy Nigg, StartCom Ltd.
XMPP:    start...@startcom.org
Blog:    http://blog.startcom.org/
Twitter: http://twitter.com/eddy_nigg


--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to