On 2015-03-31 03:34, Peter Gutmann wrote:
More generally, a second informal requirement for being in a browser,
alongside "Don't sell only a small number of certs" (to meet the TB2F criteria
required by browsers if something goes wrong)

You seem to be under the impression that the number of issued certificate is a deciding factor for being too big 2 fail, and then think it's larger than 10K. That might well be the case, but I think what you're basing it on is just wrong. The 10K you talk about is 10K validations (or connections) that saw such a certificate, out of 10G, or about 1 per million (1 ppm, 0.0001%). It's not about different certificates. I would also not say that you need more than 1 ppm of connections to be too big to fail, but rather that 1 ppm is clearly lower then the threshold.

But like with lots of things, like enforcing 2048 RSA keys, you have to have a point where you're willing to break things, and I really hope that that threshold is a few factors higher than the 1 ppm.

> seems to be "Don't be Chinese or
Arab/Persian/Turkic".  I don't know if any
Russian/Byelorussian/Ukrainian/*stani CAs are present in browsers, but I'm
guessing being one of those won't help your case either.

I know there are people who don't trust some governments. And there are some very vocal people on this list and other places that don't trust the Chinese government. But I haven't seen Mozilla take decisions based on that.

I think the best thing we can do is make technical changes so that we don't need to trust those governments. And I think CT is a big step in that direction.


Kurt

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to