Inspired by David's message, 2 suggestions for the Symantec plan:

1. Mozilla - and ideally Google as well - should clearly and explicitly 
communicate in the official statement on this that the "new" Symantec will 
still be strictly monitored even after the current remediation plan has been 
implemented. Their issue history still very much counts, potentially resulting 
in much harsher responses to future policy violations than would be the case 
for first-time offenders/other CAs. This is to counter the potential 
misconception (aka marketing) that everything is totally fine now.

2. Having Symantec inform their subscribers, as David mentions, is a great 
idea. Specifically, I think Symantec should be required to make their 
subscribers aware of the Mozilla-written! statement regarding the future of 
their CA, soon (<=1 month?) after its release. This is to prevent too many 
subscribers from getting caught by surprise in the future (see StartCom), to 
give them a chance to see more than one side, CA view _and_ Mozilla view, and 
to ensure they know they are Symantec subscribers in the first place (RapidSSL 
cert chaining to a GeoTrust root bought from some reseller = Symantec? yeah, 
totally obvious...).
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to