On 01/04/15 18:35, Richard Barnes wrote:
<snip>
*  Request that CNNIC provide a list of currently valid certificates, and
publish that list so that the community can recognize any back-dated certs
<snip>
This  corresponds roughly to option (E) that Peter Bowen raised, and
combines  the E1 and E2 options noted by Ryan.  I do not anticipate that we
would  make software changes to enforce a whitelist, but instead would rely
on  CNNIC not back-dating certificates, with the published list usable as
a  check for any certificates that the community finds (in the spirit of
CT).

Why don't you specifically require CT to be the mechanism by which this list is published?

The fact that CNNIC violated its CPS in issuing  the MCS Holdings
intermediate certificate calls into question whether  they are adhering to
their obligations more generally.  The idea of this  proposal is
effectively to impose a moratorium on CNNIC issuing more  certificates
until they have assured the community that this is the  case.

Would it be reasonable to require CNNIC to publish all certs they issue in the future too (at least until "they have assured the community that this is the case") ?

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to