Hi Nick,

I want to thank you for bringing this up, because we always seem to have the same kind of discussions when something happened. Ryan's mail has a bunch of other suggestions for what we can do.

1. Implement "Require SCTs" for problematic CAs.

Is there a reason we don't require publishing everything in CT logs? I think the publishing in the CT log can be relative simple, SCTs in the certificate might require more work. We should probably push that everybody at least has the ability to embed SCTs.

2. Create "at risk" category for problematic CAs which lasts some finite period 
of time

Could we maybe combine this with UI changes?

Finally, I would like to mention, though I expect it to be shot down, a much 
more radical way forward. RP audits. Relying Party audits.

I think an alternative is that we change the requirement of what the current auditors all have to check. I understand that the reason they don't check more is that it would require more time (and money) to do the yearly audits.

It might also be useful that we have requirements for what things should be in the audit report.


Kurt

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to