On Mon, Nov 14, 2016 at 3:46 AM, Gervase Markham <[email protected]> wrote:
>
> If this is the only privacy mechanism available for 6962bis, I suspect
> we will see a lot more TCSCs about, particularly if CAs figure out ways
> to mint them at scale within the letter of the BRs and other requirements.

It is very easy to mint TCSCs at scale without violating the letter or
the spirit of the BRs and other requirements.

> CT is getting to be very useful as a way of surveying the certificate
> ecosystem. This is helpful to assess the impact of proposed policy
> changes or positions, e.g. "how many certs don't have an EKU", or "how
> many certs use a certain type of crypto". If certs under TCSCs are
> exempt and this becomes popular, CT would become less useful for that.
>
> One possible answer is just to say: "Mozilla will not accept 'but we
> have a lot of certs under TCSCs which will be affected by this' as a
> valid reason not to do something. In other words, if you hide stuff and
> it breaks, you get to keep both pieces. But in practice, such a line
> might not hold.

I think this is the right answer.  Yes, CT has helped provide a better
view into galaxy of CAs that is WebPKI, that was not its stated
purpose.  CT was created to help domain registrants have visibility
into what is issued for their domain names.  If domain holders want to
keep their certificates semi-private, then they need to be aware that
security is a moving target and their input on data-driven decisions
may be diminished.

Thanks,
Peter
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to