On Friday, 6 May 2016 15:06:30 UTC+1, Richard Barnes  wrote:
> I would phrase this slightly differently :)  If C is a Mozilla program
> root, it has an obligation to verify that all of the subordinates under B
> are audited and disclosed.  My point is that if C doesn't do this check
> proactively, before issuing the subordinate to B, or if C relies on
> information from B and B gets things wrong, then A now has to get an audit
> in emergency mode, or else cease operations.

This is where I think our interpretations of the situation diverge. Why should 
A get an "emergency audit" ? I think it's patently ridiculous to insist they do 
any such thing, and it's certainly beyond the practical power of Mozilla. 
Mozilla can distrust C though.

> Whereas under the C='cert' policy, either A would be unconstrained and
> already audited/disclosed, or they would have name constraints and there
> would be no problem.

Consider an only very slightly different scenario, with entities A1 through C1 
instead of A through C, but now A1 and B1 are private CA issuers which 
previously weren't part of the web PKI at all. Maybe they were companies 
issuing mostly client certs to a specific industry, whatever the circumstances 
they weren't covered by the BRs or by Mozilla root programme rules. B1 is 
thinking of getting into the public CA business, and is talking to C1.

Somebody at C1 jumps the gun and issues an unconstrained certificate joining 
B1, and thus A1 into the web PKI before they've actually done any sort of audit 
or due diligence. Whoops.

In that scenario it doesn't matter whether you have policy C or policy CoAP, 
either way suddenly A1 is part of the Web PKI without being audited or 
disclosed. I believe this is because C1 screwed up and that trust stores like 
Mozilla should react accordingly, you seem to believe that instead A1 screwed 
up, by... allowing a business they have no direct relationship with to be run 
incompetently? And they now need to go through an emergency audit because... 
that will help the incompetents stay in business?

As I said, I feel you have the trust arrow upside down. When C1 violates the 
rules, the negative consequences need to accrue to C1, otherwise they have no 
incentive to obey.

When Mozilla was informed that The Walt Disney Company Root CA cert was in fact 
revoked by its issuer before that CA began violating the BRs but they didn't 
notify Mozilla, the expression of disappointment was - correctly - directed at 
that trusted CA issuer. Not at Disney, because that would be futile.

> I'm more concerned about our ability to verify that CAs are in compliance
> with the policy, in a world where we don't know the whole universe of
> cross-certs.  (And about consistency with the BRs on this point.)

Consistency with the BRs is indeed worth having, but probably shouldn't be the 
primary consideration here. If we can choose a policy that's good, or one 
that's consistent, let's pick "good" and send the consistency problem to CA/B 
Forum for them to look at.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to