> * Browser people detected this misissuance

This one, but not at least several others issued by this CA.

> * Browser people acted fast to untrust the offending ICA

Yes, but not the root which issued it in violation of many of the
policies for the trust store, despite strong language implying that this
would likely for violating a specific one of those rules.

> * Browser people conceived of and are implementing CT
> * Browser people convinced CAs to implement CT by using their limited
> political capital carefully
> * Browser people opened up the CA/Browser Forum somewhat

I'm well aware of that. I think the Chromium developers have done a
fantastic job on the technical end of things and that's the only place
where *I* see anything moving forwards. AFAIK, Mozilla dragged their
feet a lot on CT and isn't actively pushing for it with - correct me if
I'm wrong, but that's the strong impression I get from lurking on
relevant IRC channels.

> * Browser people conceived of and implemented key pinning

That's nice for Google and the other (dozen?) sites, but AFAIK you're
not willing to pin just any keys. It's not scalable and creates an
anti-competitive situation where the big companies have an inherent
security advantage. Letting CryptoCat and Tor pin their keys was a nice
move, but what about everyone else?

> * CAs don't want to go out of business

That's why browser vendors have more far more power than you're willing
to admit. You can kill their business by changing one a line of code...

> * Browser people can't break the internet

Taking away a green lock while not even downgrading to http doesn't
break the internet. It's not a black and white removal situation. If a
browser can take away the EV bar for lack of CT, it can certainly take
away the lock completely for egregarious lack of compliance with these
policies.

> * A key way to improve things is to build, not burn, bridges
> * The internet is loosely coupled, and the incentives and capabilities
> of people using it vary widely
> * Secure introduction in a globally distributed system is an unsolved
> problem

Sure, that's why a CA was added despite being known to distribute
malware and perform MITM attacks to crack down on political dissidents.

Determining whether to add a CA is very much a political decision and
it's essentially a matter of choosing sides since all users end up with
the same CAs.

> * Even if by some chance you had the solution, you're going to have a
> hard time getting heard now

The people who voiced strong, justified concerns against including this
CA weren't heard before. I doubt I'm saying anything that hasn't already
been said before on discussions you've read.

If I wanted to do that I'd just file a Chromium bug rather than ranting
on a mailing list where I've never seen any significant community input
taken into account before.

Trusting a CA known to distribute malware even after they've clearly
broken policies is more offensive than any words I can dream of
stringing together.

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to