On Monday, September 12, 2016 at 8:01:36 PM UTC-7, Peter Bowen wrote:
> I'm trying to think of this as potentially reusable code.  Just
> because IssuerA is quasi-trusted for example.com doesn't mean IssuerB
> should be.  From a logic perspective, setting the whitelist per issuer
> means you are basically creating name-constrained issuers.

To the immediate relevance, we know that two issuers can be, as is alleged w/ 
considerable evidence with StartCom & WoSign.

My point in mentioning that, again, is to demonstrate the practical 
implications, since that is as relevant - and moreso - than the generic 
solution at this point in the conversation. But I think we're in agreement that 
it's not mutually exclusive.

> I guess I wasn't clear enough.  I'm thinking that the trust store
> would remove RootA but add IssuerA1, IssuerA2, etc as trust anchors.
> So RootA could create IssuerNewA12 or whatever and issuer from that.
> As the trust store doesn't have RootA at all (not trusted or
> distrusted), users could choose how to handle RootA going forward.
> RootA's operator could also apply to have RootA added back to the
> trust store at some future point.

In every variation that I can interpret this as, this seems to be more work for 
limited value; among other things, it presumes adding back Root A is sufficient 
to avoid the whitelist, but the complexity involved in there, and the objective 
opinion being offered by software, makes that seem a profoundly unwise and 
undesirable scenario.

I think if the goal is to allow re-recognition, that should be spelled out, and 
we should carefully think of the conditions of that and the implications of it. 
In my mind, it's not and shouldn't be a goal, if the overarching goal is to 
protect user security.

> Again, assuming issuers are added as trust anchors, a "shortest path"
> algorithm would choose them over a re-added Root.  The Root could have
> additional restrictions applied (e.g. Expect-CT) that don't apply to
> the old issuers.

I'm not aware of any path building library that prefers a "shortest-path" 
algorithm. They prefer "fastest path I can discover that works" algorithm.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to