On Mon, Aug 31, 2015 at 7:02 PM, Kathleen Wilson <[email protected]> wrote:
> Breaking this out into a separate discussion: > > ...should Mozilla continue to accept >> certificates without the "Websites" trust bit? Considering that there are >> not clear guidelines for how to process either code signing or email, and >> considering their relevance (or lack thereof) to Mozilla, it would seem >> wise to carefully consider both whether to accept new applications and >> what to do with existing applications. My own personal suggestion is to >> not accept new certificates, and to purge the existing ones. >> > > > I have always viewed my job as running the NSS root store, which has many > consumers, including (but not limited to) Mozilla Firefox. So, to remove > something like root certs that only have the email trust bit enabled > requires input from the consumers of NSS. It should not be removed just > because Firefox doesn't use it. > > Is the mozilla.dev.security.policy forum the correct place to have this > discussion about the NSS root store only including root certs with the > Websites trust bit enabled? > > Or should I start the discussion in another forum, such as > mozilla.dev.tech.crypto? > Has Mozilla stopped supporting Thunderbird? The S/MIME support in Thunderbird has an insane user interface. It took me over 20 minutes to issue myself a cert. But it is there and it could be fixed very easily. I would even be willing to do the fixing only the instructions for setting up a development version of the library are utterly incomprehensible, incomplete and wrong so after a couple of days, I gave up. To support a world in which everyone is using end-to-end secure mail we need more than one trust model. The PKIX hierarchical approach works for enterprises but not for individuals. OpenPGP has two models, the direct trust model via fingerprints which works at an individual level and the Web of Trust model that everyone agrees does not scale. A couple of years ago, when I started work on what has become The Mesh, I took a look at combining the PKIX and OpenPGP approaches using a 'work factor' approach to provide an objective measure. Rather surprisingly, I discovered that it is possible to make the Web of Trust scale if you combine the Direct trust, CA Trust and Web of Trust concepts. Right now I am working on a proposal that I think takes email messaging security to the next level and makes ubiquitous use practical for the first time. I have been publishing drafts on IETF as I go along but the next increment should be a quantum leap forward. My goals are * Make computers easier to use * Make computers secure at the same time as being easier to use * Put the user in full control of their security to the maximum extent that they are able to take that responsibility. This is not the time for Mozilla to be dropping support for email roots. Moreover the principle of separating email roots and code signing roots from TLS roots is sound. If Mozilla were to stop recognizing separate roots, that would encourage CAs to conflate concerns that should be separated. _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

