On 20/10/14 03:10, Gregory Szorc wrote:
> Is there a good reason Mozilla can't host copies of the trusted CA
> bundle in popular formats so people can obtain a copy directly from
> Mozilla? And while we're at it, can we add some PGP signatures for
> additional verification?

One issue is, perhaps, that Mozilla doesn't perhaps have an official
stance on reuse of this data.

Mozilla is the /de facto/ maintainer of the only "open process" root
program. That is to say, if you want a curated root store with good web
compatibility and you don't want to do your own due diligence, you can
choose Microsoft's, Apple's or Mozilla's. (Google uses whatever the
platform store is, with some tweaks.) Of those three, we are the only
ones who run an open and transparent process. Which makes ours popular.

[The fact that we maintain this is sort of tied to the fact that we also
make NSS, and our root store is the default one in NSS (and so in most
things NSS gets into), but that's not a required link. If NSS had never
existed, we could still be doing this.]

All this means that people take our root store and embed it in things.
And we certainly don't try and stop them. Good luck to 'em, I say. And
when we make decisions about our program, we do sometimes think about
other consumers of our list. For example, we maintain a "code-signing?"
bit for each trusted root even though Mozilla software has, in recent
history, done little or nothing with code signing. (Although that may
change.)

But there's perhaps a difference between "we don't try and stop you",
and "we encourage you". Saying "here it is in a useful format - download
it" would definitely be the latter.

Perhaps we just need to jump that gap and accept what is /de facto/ true.

Gerv


_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to