On Sat, Sep 10, 2016 at 9:14 AM, Lee <[email protected]> wrote:
> On 9/10/16, Gervase Markham <[email protected]> wrote:
>> On 09/09/16 11:53, Jakob Bohm wrote:
>
> Does Mozilla feel that using 'clear text' protocols to validate
> domains is adequate security?
> https://cabforum.org/2016/08/05/ballot-169-revised-validation-requirements/
>> Authorized Port: One of the following ports: 80 (http), 443 (http), 115 
>> (sftp), 25 (smtp), 22 (ssh).

This is basically a catch-22 for initial issuance.  If you allow
validation via connection to a host operating that the requested FQDN,
then it will almost surely not be using a trusted public certificate
for the first connection.  Using ssh or accepting a self-signed
certificate does not appear to address any critical part of the threat
model.

> How bad does an auditor have to be before Mozilla will no longer
> accept them as "a trusted auditor for the Mozilla root program"?
> https://wiki.mozilla.org/CA:WoSign_Issues#Issue_J:_Various_BR_Violations_.28Apr_2015.29
>> Google noted that many of these issues should have been caught by a 
>> competent auditor.
>> WoSign's auditors at the time were Ernst and Young (Hong Kong).
>
> Will Mozilla accept CA audits done by Ernst and Young in the near future?
>
> Does Mozilla plan on giving any extra attention to CAs whose last
> audit was done by Ernst and Young?

EY, like BDO, Deloitte, KPMG, and PwC, are not single firms.  They are
"networks" of firms which usually carry out their audit/attest
services independently and are independently owned and operated.  So
an opinion from Ernst & Young Bedrijfsrevisoren BCVBA (Belgium) is
likely written by a team independent from the team that wrote an
opinion from Ernst & Young P/S (Demark) which is independent from the
team that wrote an opinion from EY 安永 (Hong Kong).  That being said, I
suspect that EY Global wants to protect its brand, so I would hope
they review any reports from any member firm that appear to be
lacking.

Thanks,
Peter
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to