My technical team was only able to identify Linux as using the NSS root store, 
but everyone assumes that other applications also rely on it as a trusted 
resource.

As to whether or not to remove the trust bits for code signing and email, I 
guess I would ask: Why did Mozilla include/create the trust bits in the first 
place?  Was it only to support Mozilla applications like Thunderbird?  Or was 
it to serve as a public resource, beyond Mozilla applications?

If the former, and if Mozilla no longer has any code signing or email 
certificate dependent applications, then I suppose you can drop the trust bits. 
 If it was the latter, then I would say the same reasons apply today – you are 
doing something to help the security of the internet, and maybe you should 
continue even if you have no immediate plan to use or recognize the trust bits 
in any ongoing Mozilla applications.

If you drop the trust bits, it will be very hard to start them up again in the 
future, and probably more time consuming to recreate the trust bits and 
requalify roots than if you just keep the trust bits for now.  Also, I would 
argue that keeping the trust bits helps make Mozilla at the forefront of the 
industry and more relevant to the internet community compared to other browsers 
than if you drop them – something that may be important.

I don’t think it’s realistic to expect every application that is dependent on 
code signing and/or email certs to maintain its own individual trusted root 
store.  Perhaps they will default to the Windows root store instead of the 
Mozilla NSS root store – is that good for Mozilla’s future?

So ultimately this question is part technical and part a business decision for 
Mozilla, and only Mozilla can decide what direction it wants to go.

From: Peter Kurrasch [mailto:[email protected]]
Sent: Friday, October 02, 2015 9:54 PM
To: Kirk Hall (RD-US); [email protected]
Subject: Re: Policy Update Proposal: Remove Code Signing Trust Bit

Hi Kirk--

Would it be possible to provide some specific examples of the applications you 
have in mind? Or maybe some use cases that would be relevant here (in the 
context of code signing)? My contention has been a significant need exists for 
code signing and that it matters to everyone. Unfortunately the discussion has 
been long on opinion (including my own) and short on good examples.

I think there is general agreement that the current Mozilla practices need 
improvement so ‎the question becomes does Mozilla want to take on that work or 
just bow out altogether. I would hasten to add that just because a security 
feature/solution has shortcomings does not necessarily mean it's better to do 
nothing to avoid any "false sense of security". Such thinking can be 
problematic--citation provided:
‎     https://news.ycombinator.com/item?id=6166731

One final comment: in terms of the embedded space, without publicly vetted 
roots I think it's safe to say that most products will include whatever root is 
necessary just to make the product work and that security concerns might not 
play much of a role, if any, in the decision making. I don't think that's such 
a great outcome. Again, an opinion but one based on first-hand experience.


From: [email protected]<mailto:[email protected]>
Sent: Wednesday, September 30, 2015 8:11 PM‎


I checked with our team, and we think it would be a mistake for Mozilla to 
remove the trust bits for either code signing or email certs.

The Mozilla NSS root store is used by some well-known applications as 
discussed, but also by many unknown applications. If the trust bits are 
removed, CAs who issue code signing or email certs may find multiple 
environments dependent on the NSS root store where the CA's products will no 
longer work - and we don't have a list of those environments today.

In the future, there may be even greater use of and need for the trust bits for 
these certs than there is today (as the use of code signing and email certs, 
and maybe related future products, may increase) - but once the trust bits are 
gone from the NSS root store, they are gone forever.


...snip...


<table class="TM_EMAIL_NOTICE"><tr><td><pre>
TREND MICRO EMAIL NOTICE
The information contained in this email and any attachments is confidential 
and may be subject to copyright or other intellectual property protection. 
If you are not the intended recipient, you are not authorized to use or 
disclose this information, and we request that you notify us by reply mail or
telephone and delete the original message from your mail system.
</pre></td></tr></table>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to