In my opinion, Mozilla's and Google's plans to distrust the Thawte,
RapidSSL, GeoTrust, Verisign, and Symantec branded CAs in the browser,
should be interpreted as a recommendation to eventually distrust them
for all server authentication uses.

If a CA gets distrusted for https, then I think it's fair to equally
consider it as no longer acceptable for other services like IMAPS or LDAPS.

As Ryan said in another thread, migration of non-https services might
take a longer time to migrate. However, based on Jeremy's statement in
  https://bugzilla.mozilla.org/show_bug.cgi?id=1437826#c3
I'd assume that the customer certificate migration efforts driven by
DigiCert should also cover migration of non-https services within a
reasonable amount of time, where general purpose client software is used
to connect to non-https services.

(I'm excluding special purpose hardware with embedded restrictions, and
also excluding manually configured server to server configurations.)

I conclude that for general purpose client software, that doesn't
implement key pinning and doesn't have restrictions on chain length, but
which wants to retain the ability to connect to services offered by
Apple or Google, the whitelisting for Apple/Google subCAs is the only
hindrance for eventual full distrust of the Symantec Root CAs.

Are the owners of the Apple and Google subCAs able to announce a date,
after which they will no longer require their Symantec-issued subCAs to
be whitelisted?

Thanks
Kai
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to