> On Aug 15, 2017, at 15:45, Ryan Sleevi via dev-security-policy 
> <[email protected]> wrote:
> 
> I would note that any CA which does not or has not promptly revoked these
> within 24 hours of contact should, at a minimum, contact all root programs
> that they participate in to acknowledge this non-compliance and discuss
> what expectations other, non-Mozilla Root Programs have with respect to
> these certificates. Similarly, if such programs have requirements around
> "Security Incident Reporting," that CAs are timely in such reports.

It’s worth noting that with the exception of the metadata-only subject fields 
issue, Alex and I have attempted to contact every CA listed directly via their 
public certificate problem reporting channels. In addition to this, the Mozilla 
Root Store policy requires all CAs to monitor this mailing list. So there are 
only two categories for a CA that has not taken action yet:

1) They are not monitoring either this list or their problem reporting channels 
(or in some cases, those channels are inoperative) and as a result are not 
aware of the issues; or
2) They are aware of the issues and have not taken action.

I believe that both of these categories are extremely concerning.

Jonathan
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to