> Do we really want the CA community to be filled with bureaucratic
> enforcement of harsh punishments for every slight misstep?  This is the
> important question that any organization (in this case this community)
> needs to ask itself whenever new surveillance abilities make it possible
> to catch microscopic infractions.

I can certainly see both sides.

The discovery of these matters is a natural consequence of the increasing 
prevalence (and ultimately mandatory nature) of CT.

I do think strong approach of identifying issues and potential issues 
accompanied with as forgiving a perspective as possible is important moving 
forward:

It is important that issues or potential issues (I would regard variance from 
the accepted norm in areas where there is ambiguity as to the propriety of a 
given encoding / parameter / etc in the standards as a "potential issue") be 
identified so that conclusions can be made as to what is or is not correct and 
proper and so that any unintended (or worse, precisely intended) consequences 
can be determined.

It is also important, however, that where there is no direct security risk, 
that there be a great deal of leeway and time to resolve the issues moving 
forward.  If this is not the case, the easy answer for any commercial CA would 
be to use the exact same software stack as every other CA.  There is already, 
in fact, a lot of concentration in that area.  If using same config X on 
software version Y of package A is the formula that every CA implements in 
order to not get caught out on these issues, this will create a significant 
monoculture as to key pieces of the PKI infrastructure which might easily 
create a greater ecosystem risk than some of these technical noncompliances.

Harsh punishments or consequences should be reserved for real security 
problems, real intentional deception, actual harms, etc.

The one gray area that must be watched for is constant issues of one form or 
another from a broad array of problem areas.  The community is NOT the basic 
compliance test bed.  A CA can not expect to just have the community do their 
QA and compliance testing.  Frequent issues on well resolved matters of a broad 
array all arising from a single CA would bring a question of whether the CA is 
exercising due care in their operations.

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to