Thanks to all of you for your thoughtful and constructive input in this discussion.

Here is a summary of this discussion so far.

Proposal: Remove references to code signing from Mozilla's CA Certificate Policy, then turn off all Code Signing trust bits for root certificates included in the NSS root store. This essentially means that Mozilla will stop saying that root certificates in the NSS root store can be trusted for code signing.

Arguments against this proposal:
- Code signing is very important in the embedded space
- Removing the code signing trust bit sends a message that Mozilla does not want to (and will not) participate in this space - The loss of Mozilla’s support could be a setback to the embedded space; i.e. innovation in embedded software could suffer. - We should not presume that the embedded space is any more amenable to a one-size-fits-all solution any more than the SSL space is.


Arguments for this proposal:
- The only situation in which this change will impact an embedded vendor is if they allow anyone with a public (i.e. chaining to a root cert in NSS) code-signing certificate to run code on their device. - A public (i.e. chaining to a root cert in NSS) code-signing cert is basically a cert that identifies an individual or organization. This alone is insufficient for a manufacturer to decide to embed another vendor's software in their products. - If a manufacturer has a direct relationship with the vendors of the software they embed, then they can directly trust code-signing certificates provided by the vendor, and not rely on the certificates chaining up to a root cert in the NSS root store. - The manufacturer should maintain their own trust list, and not shift the responsibility to Mozilla purely because they used the NSS root store in their system. - Mozilla already requires that all plugins be signed by Mozilla, so Mozilla is not depending on the NSS root store for code-signing purposes. - Mozilla currently does not have robust policies around verifying the acceptability of root certificates for the purposes of code signing. - Building a properly run code signing certificate program would be a ton of work that Mozilla has never done, and is not prepared to do. - If the decision makers are not well versed in the use cases behind code signing, then they should not be making decisions regarding root inclusion/exclusion for code signing.


Other:
- If the decision were made to proceed with the removal of the code signing trust bit, Mozilla would need to broadly publicize the change, as there may be smaller consumers of these capabilities who will need to explore other solutions.


Please let me know if I missed anything or misrepresented any of your input.

Is there any other input/feedback we should consider?

Thanks,
Kathleen


_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to