Am 2013-12-10 09:52, schrieb Erwann Abalea: > I think ANSSI knows the duties associated to running a public CA, I'm > pretty sure the different ministries don't.
I agree with the assumption that the ministries don't know the duties associated with running a public CA. Thus, ANSSI should never have issued them Sub-CA certs, since they are unable to run one correctly. What else does a CA need to do in order to be removed? This CA: 1. Has stated that it does not intend to comply with current policies for another two years, making it a total of three years for compliance. This is by far the longest of all CAs in the program. 2. Is not just having trouble with some minor details of the policy, but is violating several important requirements (e.g. 1024 bit certs, randomness for SHA-1 as per Erwann's mail) including ones critical to prevent issues like the one that happened now (audit/disclosure of Sub-CAs). 3. Has had a Sub-CA misissue for MitM purposes. This had to be detected and reported by a third party, not the CA itself. 4. Is organizationally unable to implement requirements in a timely manner. This is not an excuse, it is a reason not to be a CA. If they cannot operate a CA properly, then they cannot operate a CA. 5. Appears unable to operate a CA properly as per Erwann's mail (e.g. no valid CRLs). I'd say that once a second person has verified the issues reported by Erwann, we should remove the trust bits. Kind regards, Jan -- Please avoid sending mails, use the group instead. If you really need to send me an e-mail, mention "FROM NG" in the subject line, otherwise my spam filter will delete your mail. Sorry for the inconvenience, thank the spammers... _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

