Hello Kurt and others.

This is something I'd like to see a very long answer from someone in charge of 
these thing in Mozilla.

TIA,
Martin.

On Feb 22, 2010, at 23:25 , Kurt Seifried wrote:
> 
> This does not mean that the certificate verification mechanics are at fault;
> it only means that CA selection protocol has not been thought out properly:
> it limped along with a handful of CAs, it is showing the serious symptoms
> of the malaise with hundreds. In the meantime, does anybody here have any
> estimate of the number of CAs we expect to be around in the foreseeable
> future? And what was the number of CAs anticipated when the current
> anointment protocol was conceived?
> 
> I think it's more subtle than that, some of the problems in brief:
> 
> 1) Mozilla/Firefox either trust a CA 100% or not at all. 
> 2) Since I can't adjust trust or have Firefox warn me that I'm viewing a site 
> using a certificate I don't completely trust I can either remove the root 
> certificate, and then encounter unknown certificates and deal with that, or I 
> can manually look at EACH certificate I encounter and figure out who signed 
> it and whether or not I trust them enough (I might trust a site that I simply 
> read, but not to enter my credit card # for example).
> 3) It's very difficult even for technical users to find out who exactly 
> signed a certificate. For example a certificate is signed by "valicert", who 
> is that? (Tumbleweed bought Valicert and then Axway bought Tumbleweed, who 
> the heck is Axway and what exactly do they do?). Or a certificate is signed 
> by beTrust, who is that? (which joined up with Baltimore cybertrust to form 
> Cybertrust, and in turn Verizon purchased the whole thing.).
> 4) CAs are generally not restricted in whom they can issue certs to, i.e. 
> governmental CA's (Turkey, Holland, Denmark, etc.) are not restricted to 
> issuing certs within .tk, .nl, .dk for example (there are good arguments for 
> and against this, but I think it should at least be discussed, and I'd love 
> to see a bit more user control over this).
> 5) There is no way for an end user to really verify the CPS/CS stuff, most 
> CAs seem to publish them online, quite a few are out of date by several years
> 6) There appears to be no re-evaluation for CA's that are bought out or merge 
> with other CAs
> 7) There are several suspicious and questionable looking CA's in 
> Mozilla/Firefox, e.g.: Internet Publishing Services from Spain, they have 7 
> certificates, what possible need is there for 7 certificates?
> 8) The CA approval protocol appears to be largely fail open, they submit 
> paperwork showing they comply with certain standards/etc at a certain time 
> point and then there is a public comment period (where exactly?) and if 
> no-one objects they are in.
> 9) there is no formal process to revoke certificates for a CA that violate 
> the rules. Heck theres no official set of rules for them to break (one signed 
> malware code, on hundred signed malware codes? a provably weak domain 
> authentication process that allows people to buy certificates for domains 
> they don't own reliably, etc.). 
> 10) I'm not even sure whom exactly  to contact about these issues or to 
> report security problems with respect to a CA doing bad things (so I've been 
> lurking on the list for a bit and am now posting).  
> 
> I've also seem these topics raised in this forum, Bugzilla, etc. and nothing 
> much come of them which is what I expect to happen here sadly. One simple 
> question I'd love to see answered: who exactly is in charge of this and what 
> exactly do they do (it seems that certificate approval duty floats around 
> between a few people). 
> 
> -Kurt


-- 
Martin Paljak
http://martin.paljak.pri.ee
+3725156495


-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to