On Tue, Mar 31, 2015 at 02:34:45PM +1300, Peter Gutmann wrote:
> Matt Palmer <[email protected]> writes:
> 
> >However, given that CNNIC felt it appropriate to violate their CPS with
> >regards to an intermediate CA certificate, I don't see that there's any
> >greater reason to trust their adherence to their CPS in any other aspect.
> >Thus, I'm not not keen on allowing them to issue *any* further trusted
> >certificates.
> 
> So this is now a convenient excuse to kick out CNNIC, after the initial
> attempts to not let them in in the first place failed.  I've always wondered,
> what do people have against CNNIC and Turktrust in particular?  Why the
> hostility focused on just these two CAs, when there are plenty of others who
> have behaved in a far more dubious manner?

I wasn't involved in d-s-p when those previous cases were considered,
otherwise I'd have said exactly the same thing about the CAs involved in
those cases, too.

> More generally, a second informal requirement for being in a browser, 
> alongside "Don't sell only a small number of certs" (to meet the TB2F 
> criteria 
> required by browsers if something goes wrong) seems to be "Don't be Chinese 
> or 
> Arab/Persian/Turkic".  I don't know if any 
> Russian/Byelorussian/Ukrainian/*stani CAs are present in browsers, but I'm 
> guessing being one of those won't help your case either.

Or, presumably, Dutch.

- Matt
(Oooh, *good* sigmonster, have a biscuit)

-- 
"If a politician fixes a problem then he loses it as a campaign issue. But
if he makes the problem worse while heroically fighting against it, then
he's golden."
                -- Rex Tincher

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to