On 5/14/2015 8:25 AM, Gervase Markham wrote: > Hi everyone, > > The topic of name-constraining government CAs, probably to the TLD(s) of > their territory(ies), has come up numerous times. I'd like to try and > hash out, once and for all, whether we think this is actually a good > idea, so we can decide to work towards doing it, or decide actively not > to do it. And then document the decision. > > Questions > ========= > > The key questions I would like to discuss to begin with are: > > 1) "Is the security analysis relating to government CAs, as a class, > different to that relating to commercial CAs? If so, how exactly?" > > 2) "If it is different, does name-constraining government CAs make > things better, or not?" > > These questions will probably lead us, in passing, to discuss how to > define "government CA", but let's try not to let that dominate the > discussion. If possible, stick to clear examples. > > I think that if we can get clear answers to those questions, those would > form the basis of a policy to explain why we are (or are not) taking action. > > Scope > ===== > > Out of scope for this discussion are: > > * Whether we should name constrain CAs other than government CAs (note > it's possible we may decide not to name constrain government CAs as a > class, but later decide to name constrain some other class of CAs) > > * The trustworthiness or otherwise of particular specific governments > > * The exact details of which TLDs any particular government CA might be > constrained to > > * The level of impact on the net of imposing such constraints
There is an ongoing dispute between the U.S. and China whether the government in China is behind attacks on both government and commercial computer systems in the U.S. This is NOT to question the trustworthiness of the government of China but to give one example of the possibility of hostile actions by a government certification authority (CA). Snowden revealed how the U.S. NSA is intercepting Internet communications in bulk. This is NOT to question the trustworthiness of the government of the U.S. but to give another example of the possibility of hostile actions by a government CA. With "cyberwarfare" constantly discussed in the news, U.S. Congress, and other venues, it appears to me that government CAs should indeed be restricted to the TLDs of their respective jurisdictions. Furthermore, since governments can apply pressure (often secretively) to commercial enterprises, a similar restriction should be applied to all commercial and non-government CAs. In this case, they should be restricted to TLDs of those jurisdictions where they have registered and whose governments have granted the CAs permission to operate. -- David E. Ross I am sticking with SeaMonkey 2.26.1 until saved passwords can be used when autocomplete=off. See <https://bugzilla.mozilla.org/show_bug.cgi?id=433238>. _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy