On Wed, March 25, 2015 10:18 am, Peter Bowen wrote:
>  E) Enable existing CNNIC-issued certificates to continue to work but
>  block new ones. Two possible ways this could be done:
>
>  1) Code a cutoff date, and treat any certificate with a not_before
>  date after the cutoff date as untrusted.
>
>  2) Require CNNIC to provide a list of all unexpired issued
>  certificates, white list those certificates, and treat any others as
>  untrusted.
>
>  This would not penalize those site owners who chose CNNIC but would
>  indicate that the lack of trust in CNNIC's processes mean that future
>  certificates are not trusted.

It's worth noting the technical issue with E1 is that you cannot use the
not_before (which is set and signed by the CA) if you do not trust the CA.

E2 differs, in that it acts as an external counter-party (much like, say,
Certificate Transparency does), and thus does not rely on the CA.

That is, in a hypothetical world where E1 is pursued (for any CA), the CA
can simply backdate the certificate. They'd be non-compliant with the
Baseline Requirements, presumably, but that is somewhat how we got here in
the first place.

So purely on a technical level, E2 seems to be the only viable option of
the E options.

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to