Kai, I can give you a little history to explain our actions.

Although it's clear today that there's (at least) two classes of users for SSL 
certificates, browsers and non-browsers (devices like POS terminals, TVs, 
etc.), that's not always been the case. For years, we (and I'm sure other CAs) 
have issued certs to both classes from the same roots and intermediates.

If we had known that in 2012, one class (browsers) would begin enforcing strict 
rules on certificate issuance, we probably would have created separate roots 
and intermediates for the other class(es) to keep them separate. But we didn't 
do that.

Now we find ourselves in a situation where customers have embedded our roots in 
their non-browser devices. These devices don't auto-update like browsers, so 
they cannot now move to new roots; in some cases, they can't even move to new 
intermediates; in many cases they can't handle 2048-bit keys or SHA-2). They 
come to us and ask for a renewal of their cert, and it usually needs to be the 
same as what they had been using. 

We tell them we can't give them what they want, because of Baseline 
Requirements. Many of them ask why browser vendors have the ability to tell 
them what kind of cert they can or can't have. It's always a difficult 
conversation.

So our position has been that the requests from these non-browser customers are 
legitimate; the situation evolved and was not planned to be this way. We work 
with each customer to try to find a solution that works for them and is 
BR-compliant. But if all else fails, we try to find a solution that works for 
them and does not harm the browser-user community. That's what happened in this 
case.
As one of the founding members of the CA/Browser Forum, we take the Baseline 
Requirements very seriously and we certainly don't ignore them.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to