On Sunday, April 1, 2018 at 4:16:47 AM UTC-6, [email protected] wrote:
> I fully understand the proposed solution about 2018 roots but as I previously 
> said some concerns arise, [...]


That is unfortunate for Camerfirma, but it is not Mozilla or this lists issue. 
While people have provided some suggestions on how you can create a root that 
*might* be acceptable, I don't think any of the participants care if Camerfirma 
has a root accepted; given the issues previously identified and the responses 
to those issues, I think a number of participants would be just as happy if 
Camerfirma doesn't get accepted.

> 
> [...] A complete revocation of any SSL certificate issued by 2016 root [...]

There are at least a couple of problems with this
1. Revocation, while a useful tool to have, there are a number of issues 
surrounding it, including distribution of those revocations. Given that the 
root isn't currently trusted it doesn't make sense for Mozilla to start 
trusting it but also need to ship a bunch of revocations for mis-issued 
certificates from it.
2. Given the issues that have already occured with this root, there is going to 
be questions of whether all the certificates that it has issued are properly 
recorded, so that they can now be revoked. That is, given the existing issues, 
how can Mozilla be confident that all the certificates will be revoked. This is 
not a question of willingness, but rather capability to identify and revoke all 
the certificates signed by this root.

-- Tom
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to