I dislike the idea.  Other CAs contribute to the discussion but should not the 
gatekeeper. Ryan Sleevi makes complete sense since Google uses the NSS store.  
Commercial CAs actually having a say on another CA's inclusion (outside of the 
current public discussion) seems like something that should be prohibited by 
policy.

-----Original Message-----
From: dev-security-policy 
[mailto:dev-security-policy-bounces+jeremy.rowley=digicert....@lists.mozilla.org]
 On Behalf Of Kathleen Wilson
Sent: Friday, February 6, 2015 2:37 PM
To: [email protected]
Subject: Re: Updating Peers of Mozilla's CA Certificates and CA Certificate 
Policy modules

On 2/5/15 10:41 PM, Man Ho (Certizen) wrote:
>
> However, if Mozilla would add one
> more peer from CA background (except Let's Encrypt), it'd be even better.
>


There are indeed several representatives of the CAs in Mozilla's program who 
regularly provide valuable contributions to the discernment and discussions 
regarding the CA program.

How do you all feel about the idea of one (or more) of the representatives of 
the CAs in Mozilla's program also being a Peer of the CA Certificates module?

Reminder of what this means...
Name: CA Certificates
Description: Determine which root certificates should be included in Mozilla 
software products, which trust bits should be set on them, and which of them 
should be enabled for EV treatment. Evaluate requests from Certification 
Authorities (CAs) for inclusion or removal of root certificates, and for 
updating trust bit settings or enabling EV treatment for already included root 
certificates.

Kathleen

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to