As for what CA organizations to include in a future iteration of the
Mozilla root store, I would say that there are 4 groups that I (as a
browser user) would like to get included and 2 which I would not:
1. Global public CAs that provide certificates to subscribers from all
over the world subject to appropriate security controls to avoid
issuing to people other than what the certificate states and avoid
technical compromise of the certificate infrastructure and the relying
party software.
2. National public and government CAs that issue certificates only to
their own subjects (citizens, organizations, institutions) to similar
high standards further enhanced by their authoritative knowledge of
the true identities of subscribers. However trust in those should be
technically constrained (either in the roots or in extra root store
metadata) to only the country identifiers they are actually
authoritative for. For example the Taiwan Governmemt roots should
only be trusted for the .tw TLD (or perhaps some government
subdomain). Similar any new Danish national CA (replacing the dead
TDC CA) would only be trusted for the .dk, .fo and .gl TLDs .
The C= and jurisdictionOfIncorporation parts of distinguished names
should also be restricted.
3. Major vertical CAs for high value business categories that issue
publicly trusted certificates at better than EV level integrity. For
example if the VISA CA was issuing public certificates for the
customer facing secure account web interfaces of most of the
participating banks and credit card issuers, worldwide, they would be
valuable CA to include. The same would be true if the (now historic)
SET payment standard had been included in Firefox and relied on VISA
issued certificates for the payment servers.
4. Selected company CAs for a handful of too-bit-to-ignore companies
that refuse to use a true public CA. This would currently probably
be Microsoft, Amazon and Google. These should be admitted only on
a temporary basis to pressure such companies to use generally trusted
independent CAs.
Root operators not to include:
-1. Root programs that engage in actually harmful activities such as
MiTM attacks or mandatory key escrow. Seems many "ElDAS" style CAs in
the EU do the latter.
-2. Root programs that serve only themselves and have not become too-big
to ignore.
On 17/01/2018 00:45, Wayne Thayer wrote:
I would like to open a discussion about the criteria by which Mozilla
decides which CAs we should allow to apply for inclusion in our root store.
Section 2.1 of Mozilla’s current Root Store Policy states:
CAs whose certificates are included in Mozilla's root program MUST:
1. provide some service relevant to typical users of our software
products;
Enjoy
Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy