On 2014-08-13 20:16, Kathleen Wilson wrote:
4) I think we need to formally augment the audit process with software
tools; such as analysis of data of existing sites chaining up to roots
being considered for inclusion. And also run periodically for included
roots.

I think it would be useful if we could at least start with documenting things that someone external can (try to) look at. Maybe not all of them can be automated, and such a list would at least be useful to do a manual check. So some of the things I'm thinking about: - The checks I already do on the certificates itself. I can of course add more tests if needed. - On a collection of certificates we can check things like duplicate serial number or that it has enough entropy
- That OCSP work.

There are probably others that I'm forgetting.

But I'm also wondering what our policy should be if we can detect problems. It's probably going to depend on the problem we find. But if there are problems that we consider that it requires a new audit, maybe we should also document which one we find so serious?

Do we also need a policy about how fast we would like issues to be fixed? At which point do we remove a CA that does not comply?


Kurt

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to