With the vast number of private PKIs created by the CA service included in
Windows Server, the enterprise market tends to rely on Active
Directory-based distribution within the forests it controls.  This leads to
an IE mandate, within a network that the owner/operator of the PKI controls.

When a private PKI attempts to cross outside its territory and unconsciously
or subconsciously affect individuals through modification of how a browser
operates, that crosses a line into warranting browser enforcement of
constraint on what that PKI can do because it is no longer private once it
reaches beyond its arm.  This is what this discussion has mainly touched so
far, and I don't contest that one bit, rather I'm interested in the
opportunity in this situation.

Poles defined, that leaves the grey area.  Mozilla policy might wish to
encourage and enable distribution of enterprise roots with the simplicity of
AD group policy push.  This supports an enterprise alternative, however it
isn't easy to draw the boundary when you don't have a central repository
that distinguishes a target device as subscribed to the enterprise network
or not.  Certainly there is plenty of genius among the dev community to
overcome that with something more flexible than name constraints that become
huge for large companies and change with every acquisition or brand launch
requiring re-issuance.  The problem needs dynamic data because the corporate
name space is not static.

Create membership in and enrollment to the influence of a private PKI not
only from an end user pull but also a central corporate authority push and
we solve the realm of authority issue.  PrivDog and Superfish affect beyond
their realm.  OK, so create realm.  Create a market for scoped buy in where
the systems touched and people affected are wholly within the authority of
the PKI injected into their browser.

When the scope of interception is within a network that the PKI owner
controls and the humans on that network are subject to its policy of
interception as a condition of employment and they agree by remaining
employed, then the interception is a controlled implementation of policy
across an owned private scope.  Even in the case where consent is not very
conscious, attempts to suppress entirely rather than scope
private-root-based interception will result in IE mandates.  The root can be
GPO-pushed silently, and either the proxy servers or the desktop management
software can disable non-IE use.

Kind regards,
Steven Medin
Product Manager, Identity and Access Management
Verizon Enterprise Solutions
 


-----Original Message-----
From: dev-security-policy
[mailto:dev-security-policy-bounces+steve.medin=verizonbusiness....@lists.mo
zilla.org] On Behalf Of Clint Wilson
Sent: Monday, February 23, 2015 5:14 PM
To: [email protected]
Subject: Re: Tightening up after the Lenovo and Comodo MITM certificates.

Lots of Enterprises and organizations have very legitimate requirements to
add their own internal root CA to the NSS store. In fact, Mozilla even
answers the question of how to do this:
https://wiki.mozilla.org/CA:FAQ#How_do_I_import_a_root_cert_into_NSS_on_our_
organization.27s_internal_servers.3F

What type of "signing" of these internal Root certificates should be
required?


On Monday, February 23, 2015 at 2:40:15 PM UTC-7, John Nagle wrote:
> With the Lenovo and Comodo disclosures, the restrictions on loading 
> new certificates into Firefox clients need to be tightened.
> 
>     Add-on policy is moving to a new system where add-ons cannot be 
> added to a production version of Firefox without approval from AMO.
> SSL certificates should get the same treatment.  If you can't install 
> a new add-on unless it's been signed by AMO, why should you be able to 
> install a new SSL certificate without having it signed?
> 
>                               John Nagle
>                               SiteTruth
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to