On Wed, March 25, 2015 7:52 pm, Peter Kurrasch wrote:
>  I'm not suggesting I have a firm answer in mind, but I am saying that
>  while we're focusing on CNNIC it doesn't seem right that the actual
>  perpetrator suffers no consequence. 

Peter,

Hopefully my first reply to Kathleen's message has demonstrated sufficient
evidence that CNNIC has, independent of any actions MCS took, violated the
BRs in several real, meaningful, and significant ways.

That is, even if MCS Holdings had never placed such a certificate on a
MITM device, the very act of giving MCS Holdings a certificate, and the
manner in which it was done, was itself an action that failed to uphold
and abide by the Baseline Requirements and CNNIC's CPS.

That MCS Holdings used their certificate in a way that was non-compliant
with the BRs is certainly unfortunate, but in doing so, it brought to
light the even more serious seeming non-compliance of CNNIC.

I think it's reasonable to first question what steps should be taken to
preserve or restore trust, before discussion of how to avoid and/or
mitigate such situations in the future.

But let's be clear: while MCS Holdings violated their agreements
(according to CNNIC), which, per Mozilla policy, reflects upon and is
ultimately the responsibility of CNNIC, CNNIC independently appears to
have violated even more of the Baseline Requirements, and has done so
wholly independently of MCS's actions.

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to