That sounds like rot to me.

You've portrayed the suggestion that Mozilla support a change so that a
CA would be required to more distinctly express it's policy (in the
matter of whether it considered the certificate DV, OV, EV) as an act of
the devil himself.

It's a bit over the top.

Robin


> -----Original Message-----
> From: dev-security-policy [mailto:dev-security-policy-
> [email protected]] On Behalf Of Ryan Sleevi
> Sent: 25 July 2014 16:59
> To: [email protected]
> Cc: [email protected]
> Subject: Re: Proposal: Advocate to get Section 9.3.1 (Reserved
Certificate
> Policy Identifiers) made mandatory.
> 
> On Thu, July 24, 2014 8:59 pm, [email protected] wrote:
> >  So, based off of the comments that have been made, please can
> Mozilla
> > support such a change?
> >
> >  If not, what would Mozilla's objections be that are in scope to the
> > question/issue? Presently, none appear to have been articulated.
> >
> >  The immediate benefit to Mozilla would be consistency and
> conformity
> > among  the OV certificates that get issued. This is because, as
Jeremy
> > mentions,  they will be bound by the requirements that inclusion of
> > the OID brings as  it is an assertion of compliance.
> 
> This is a tautology. There is no benefit except consistency, and there
is
> no benefit to consistency.
> 
> There is no need for an assertion of compliance - CA's make those
> assertions themselves.
> 
> Further, the idea that a single OID is suitable for this is laughable,
in as
> much because there's no "single" version of the BRs that's fixed and
> immutable.
> 
> As you can see from https://cabforum.org/baseline-requirements-
> documents/
> , there are many versions. What you, minimally, want if you wish to
> programatically express some value (and if it's not programatically
> expressible, then there's no way there's value in manual inspection,
> since there's no algorithm that people can use), is that the exact
version
> of conformance to the BRs is expressed in the cert.
> 
> >
> >  As has been said but probably needs to be reiterated, we all need
to
> > be  careful not to conflate, confuse and overload the issue with the
> > entirely  separate and distinct questions that surround handling of
> > the certificate  in code and what appropriate UX is. These are
clearly
> > far more  contentious, perhaps political in nature, and should be
> > considered and  discussed independently to this.
> 
> I think we need to be careful in suggesting arbitrary and capricious
> requirements that fail to move the security needle further in a
particular
> direction.
> 
> Do I wish everyone would include the u in favourite and colour? Sure.
Do
> I think it should be mandatory to get a secure UI? No.
> 
> What's still missing is an articulation of value beyond the mere value
of
> consistency (which itself is not met).
> 
> And, of course, let's not forget that it would require CAs to re-do
their
> entire cert hierarchy - policy OIDs flow down from the root; this is,
for
> example, how EV is validated. Requiring this would require redoing the
> cert hierarchy semi-regularly, and would still fail to accomplish the
goals
> the next time a new version of the BRs that tangibly altered the
> requirements came out and a new OID had to be assigned.
> 
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to