Would it be an option to remove the trust bits on the root first and then later 
on remove it from the store entirely? 

While I agree that action is warranted my concern is that the consequence of 
any action taken will be borne out by the customers of this CA and their users. 
We are essentially saying any of those web sites will, at best, get a cert 
warning. Some users of course will be able to add an exception. If the site 
happened to use HSTS, though, there ‎is no recourse and so Mozilla will have 
created a DoS situation against those sites. 


Along these lines, does Mozilla have any resources at its disposal to help get 
the word out that this action is in the works? I'm sure web site owners would 
appreciate having a chance to acquire new certs before their sites go black.


  Original Message  
From: Kathleen Wilson
Sent: Thursday, March 19, 2015 1:31 PM
To: [email protected]
Subject: Re: Propose Removal of E-Guven root

On 3/18/15 12:40 PM, Kathleen Wilson wrote:
> All,
>
> I propose removing the following root cert from NSS, due to inadequate
> audit statements.
>
> Issuer:
> CN = e-Guven Kok Elektronik Sertifika Hizmet Saglayicisi
> O = Elektronik Bilgi Guvenligi A.S.
> C = TR
>
> SHA-1 Fingerprint:
> DD:E1:D2:A9:01:80:2E:1D:87:5E:84:B3:80:7E:4B:B1:FD:99:41:34
>


I have filed the bug for the corresponding code changes:
https://bugzilla.mozilla.org/show_bug.cgi?id=1145270

Thanks,
Kathleen


_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to