I checked with our team, and we think it would be a mistake for Mozilla to 
remove the trust bits for either code signing or email certs.

The Mozilla NSS root store is used by some well-known applications as 
discussed, but also by many unknown applications.  If the trust bits are 
removed, CAs who issue code signing or email certs may find multiple 
environments dependent on the NSS root store where the CA's products will no 
longer work - and we don't have a list of those environments today.

In the future, there may be even greater use of and need for the trust bits for 
these certs than there is today (as the use of code signing and email certs, 
and maybe related future products, may increase)  - but once the trust bits are 
gone from the NSS root store, they are gone forever.

Mozilla does a sensible public review of a CA's practices for code signing and 
email certs before turning on the trust bits - and if Mozilla's review isn't 
sufficient, whose is?  Plus, 90%+ of the important issues for security for 
these trust bits (concerning CA infrastructure security, etc.) are covered for 
the CA already for SSL and audited by WebTrust and ETSI, so the remaining 
issues for the code signing and email trust bits really can be limited to the 
CA's authentication and issuance practices.  Even without clear industry 
authentication standards such as exist for SSL in the Baseline Requirements, 
who can conduct this review better than Mozilla?  (Answer: no one, and no one 
else will bother to do the review.).  Without Mozilla trust bits, the 
trustworthiness of these types of certs will likely go down.

Finally, if the trust bits are turned off, I'm concerned that some applications 
that use code signing and email certs will just go static on their trusted 
roots - they will freeze their trusted root stores as of 2015 when Mozilla 
turns off the trust bits, and never bother to update (as they have no place to 
go for an update).  Over time, their roots stores may include CAs whose roots 
have been limited or revoked, but the applications may not think it's useful to 
update their own root stores because Mozilla is no longer maintaining the trust 
bits they care about.  New CAs could be frozen out of these applications.

If the work it too much for Mozilla to continue - consider a less-good approach 
which says that if a root is trusted in the NSS root store for SSL (has current 
audits, etc.), its trust bits for code signing and email will automatically be 
turned on, and will only be turned off (removed) if the CA is found to have 
done something bad with its code signing and/or email certs.  Trusted by 
default, but can lose the trust bits by bad actions.

<table class="TM_EMAIL_NOTICE"><tr><td><pre>
TREND MICRO EMAIL NOTICE
The information contained in this email and any attachments is confidential 
and may be subject to copyright or other intellectual property protection. 
If you are not the intended recipient, you are not authorized to use or 
disclose this information, and we request that you notify us by reply mail or
telephone and delete the original message from your mail system.
</pre></td></tr></table>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to