> I'd be happy to make a
> mozilla-is-irresponsible-for-shipping-a-browser-with-no-sandbox-and-not-enforcing-CA-policy-and-more
> mailing list but I'd still express my strong opinions here too.

IMO, refusal to actually enforce the CA policy is identical to other
stupid decisions like Firefox not using PIE (ASLR) on Linux. In that
case, it's because one or two users had a workflow of navigating to the
directory and running the binary directly via a specific file manager
that can't run PIE binaries because libmagic considers them to be a library.

The choice to place minor short-term pain faced by a tiny minority of
end users over the security of everyone else is a consistent one. The
policy decisions are brain-dead across the board in Mozilla projects and
only the opinion of  Mozilla employees really matters, regardless of the
"community" claims.

I say this as someone who wasted countless hours (>800 commits, many of
them substantial) contributing to Mozilla projects and learned of their
outright contempt for their users and their community.

They're willing to set the security standards *really low* because all
that matters is market share. I can't really understand how they ended
up in the position of having the dominant trust store used by FOSS
projects. Debian and other projects should move away from simply
shipping Mozilla's trust store as-is ASAP.

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to