Gerv,
I saw the previous thread on name constrain on possibly all gov CAs.But I have 
to point out that state hackers routinely uses legit software vendors to sign 
malware. Stating that I'm not an CA expert, CT sounds much more effective and 
less subjective than constrain government CAs
HTTPSeverywhere has a certificate observatory which can be adapted to this 
purpose. I would think the number of problematic sites (e.g switching between 
CNNIC and Verisign) is quite small. Those incidents can be examined manually, 
for example, emailing the domain owner to check legitimacy.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to