On Friday, 6 May 2016 11:59:32 UTC+1, Rob Stradling  wrote:
> Nick, IIUC you're arguing for "CoAP" (to use Richard's terminology).  Is 
> that right?

I suppose so. I think Richard has the trust arrow upside down in his reflection 
on this policy. Take his scenario in which a SubCA (A) is surprised to discover 
that its previously constrained parent (B) has now obtained an unconstrained 
certificate from a trusted root (C).

Richard seems concerned that this puts A in an awkward position, but what idiot 
is running C? They've just issued an unconstrained certificate to B, and they 
apparently didn't so much as reach out to previously constrained A, never mind 
having it properly audited for the new responsibilities they've given it. Did 
they even review the signatures from B to ensure they knew A existed? Nobody 
should trust C after this. With C untrusted, the unconstrained certificate 
they've erroneously issued is now worthless and A can continue to be as well 
run as it was before - once its leadership team have recovered from their heart 
attacks.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to