On Thu, Sep 10, 2015 at 1:20 PM, Kathleen Wilson <[email protected]>
wrote:

> Proposal for version 2.3 of Mozilla's CA Certificate Policy:
>
> Remove the code signing trust bit.
>
> If this proposal is accepted, then there would be follow-up action items
> that would need to happen after version 2.3 of the policy is published:
> 1) Remove any root certificates that do not have the Websites and/or Email
> trust bit set.
> 2) Remove references to Code Signing trust bits from Mozilla’s wiki pages.
>

FWIW, I think this is a great and long-overdue idea. Mozilla can't do
everything; it has to make trade-offs on what to spend its time on. And, it
makes much more sense to stop caring about code signing trust bits in NSS
to make time for solve more important issues that are more relevant to
Mozilla's mission.

Building a properly-run code signing certificate program would be a ton of
work that Mozilla simply has never done. I think some of the arguments in
this thread for keeping code signing in Mozilla's program aren't fully
informed on just how little Mozilla actually did with respect to code
signing CA trust.

The same argument applies to email. Nobody wants to admit that Thunderbird
is dead, it is uncomfortable to know that the S/MIME handling in
Thunderbird has been unmaintained for at least half a decade, and it's a
little embarrassing to admit that the model we use for deciding which CAs
get the SSL trust bit works even less well for S/MIME and that basically
nobody cares about the S/MIME or code signing bits. But that's all true.
It's my professional opinion that if you actually care about S/MIME
security then it would be a mistake to use Thunderbird. (Sorry, people
volunteering to keep Thunderbird going.)

Cheers,
Brian
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to