‎I think what you've said here, Brian, is basically what I was looking for. Actually I wanted you to tell me I'm completely misinformed and these are the ways people will be protected. 

I'm thinking it might be appropriate to have some sort of communique sent out to the CA's so that all of them understand this situation, can adjust their practices as necessary, and can educate their customers so the customers can make informed decisions.

We all know ‎there are people out there who think "well if something goes wrong I can just revoke the certificate or something". That thinking is flat out wrong.

Let me add that I am genuinely concerned about what this can mean for FF and maybe all browsers. I think there are admins and regulators and other "security folk" who might impose restrictions on Mozilla's products. I shudder to think anyone would say "for maximum security you should use MSIE".


From: Brian Smith
Sent: Friday, November 1, 2013 7:12 PM
Cc: Eddy Nigg; [email protected]
Subject: Re: Netcraft blog, violations of CABF Baseline Requirements, any
consequences?

On Fri, Nov 1, 2013 at 4:00 PM, <[email protected]> wrote:
Seriously, though, anyone who has ever issued a CRL was basically wasting valuable electrons on something that doesn't get used (by FF--don't know about the others).

Or to put it another way, everyone could stop issuing CRLs immediately and have n‎o appreciable impact on Internet security. I think that would surprise many people. 

I agree with everything quoted above. Don't waste your time with CRLs if you care only about browsers. Work on deploying OCSP stapling if you think revocation checking is important.

Cheers,
Brian
--
Mozilla Networking/Crypto/Security (Necko/NSS/PSM)

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to