On 08.10.2013 07:16, Kaspar Brand wrote:
> On 06.10.2013 20:52, Brian Smith wrote:
>> In the abstract, I support the removal of the EV indicator for certs
>> from CAs that don't meet our requirements for OCSP, including the
>> requirement that OCSP responders must return a signed "unknown" or
>> signed "revoked" response for unknown certificates,
> 
> Fine. So in the case of Verizon, why does Mozilla not proceed with
> removing their EV enablement? Their EV issuing CA has been non-compliant
> for 2 years, 9 months, and 8 days by now. No wiggle room for any
> discussion about effective dates etc., they undisputably failed to
> implement a mandatory component of their revocation infrastructure (and
> were certainly aware of this requirement in 2009, see
> https://groups.google.com/d/msg/mozilla.dev.security.policy/x_cuezl71OI/lt-ftQ0jmFoJ).

Another 10 days have passed without any apparent sign of Mozilla's
willingness to address the case of the non-existence of an OCSP
responder for the Cybertrust SureServer EV CA.

Let me quote again from the Mozilla CA Certificate Policy:

CA Certificate Enforcement Policy, Version 2.2, item 2:
> Mozilla may, at its sole discretion, disable (partially or fully) or
> remove a certificate at any time and for any reason. Mozilla will
> disable or remove a certificate if the CA demonstrates ongoing or
> egregious practices that do not maintain the level of service that
> was established in the Inclusion Section of the Mozilla CA
> Certificate Policy or that do not comply with the requirements of the
> Maintenance Section of the Mozilla CA Certificate Policy.

CA Certificate Inclusion Policy, Version 2.2, item 19:
> We have appointed a CA certificate "module owner" and (optionally)
> one or more "peers" to evaluate CA requests on our behalf and make
> decisions regarding all matters relating to CA certificates included
> in our products. CAs or others objecting to a particular decision may
> appeal to the Mozilla governance module owner or peer(s), who will
> make a final decision.

Will Mozilla at least make its decision re: keeping the EV enablement
for Verizon public? Otherwise, the CA Certificate Policy is definitely
becoming nothing but a farce (cf. e.g. item 2 of the Inclusion Policy,
"a public process, based on objective and verifiable criteria"), and the
Enforcement Policy in particular will remain a paper tiger in all eternity.

Kaspar
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to