Hello,

Am 04/23/2014 05:51 PM, schrieb Eddy Nigg:
> On 04/10/2014 07:05 PM, Eddy Nigg wrote:
>> I agree - I've saw the tweets bug reports and this posting. I'll be glad
>> to join the discussion and we intend to take a public stance as soon as
>> things calm down a bit.
>>
>> Currently all hell is lose, but I promise to get back to you all in due
>> time and will explain our position, policy and practices and also refute
>> some of the claims that were made.
>>
>> In the meantime please be patient, thanks.
>>
> 
> 
> Alright - things have calmed down luckily by now. As my first input to
> the discussion please read carefully my explanation, thoughts and
> comments I've written down in my blog at https://blog.startcom.org/?p=230

thanks for explaining your reasons, but I don't agree on your position
in two major points. You say:

"The majority understands and cooperate fully, but there are those that
cry foul. Unjustified though, because StartCom has clearly disclosed
this fact at its web sites and policies and has never hidden it."

What's your argument here? Is "crying foul" "Unjustified", because
nobody "cried foul" the moment you published your policies?
Please consider:
Heartbleed-scale problems have hardly happened before. I'ven't
considered any mass-key-compromise scenarios before [1] - Looking at the
state of OSCP out there, I might not be the only one.
Personally, I am "crying foul" because I'm re-thinking your policies
having heartbleed in mind. Is this unjustified? I don't think so. But
arguing it is, because I could have done this earlier is not constructive.

The crucial part is - imho:
Is StartSSL still trustworthy while having these policies? - aka: Does
it comply with the mozilla ones?
Personally, I vote no. StartSSL is not revoking certificates assumed to
be compromised, if a subscriber doesn't pay.

IMHO it boils down this question: What is the likelihood and impact of
encountering compromised, non-revoked StartSSL-certificates?
-> You say it is small / low by describing the circumstances under which
it happens and causes an impact.
-> Others disagree, going safety first. "(...) private keys should be
considered as compromised and regenerated as soon as possible." [2]

I respect your / StartSSLs opinion, but vote for safety first. IMHO
"safety first" is an important property of a trustworthy CA.

However, it's not up to me to decided whether StartSSL is still "ok" to
be shipped with mozilla. I hope to see an official statement of mozilla,
soon.

Greetz, Jan


P.S.

(i) I really hope, that you change your mind by doing revocations for
free and charge for re-keying. This will break the
issuing-revocation-cycle, too, while going safety first.

(ii)
I strongly don't agree with that point:
"For private sites that are usually not visited by the public
(administrative panels for example), changing the host name, deleting
the previous DNS entry, obtaining a new certificate and never visit the
original site again might work too. Many of the free Class 1 level
certificates are used for such purpose."

The point is: After key-leakage mitm attacks are possible. Think of an
insider being in a encrypted Wifi network. Having "valid" cert for an
unused subdomain can do harm ...

[1] "Debian-randomness" is the only think, I can remember, but it was
smaller, afaik.
[2] https://lists.debian.org/debian-security-announce/2014/msg00071.html
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to