On Sunday, April 1, 2018 at 4:16:47 AM UTC-6, [email protected] wrote: > I fully understand the proposed solution about 2018 roots but as I previously > said some concerns arise, [...]
That is unfortunate for Camerfirma, but it is not Mozilla or this lists issue. While people have provided some suggestions on how you can create a root that *might* be acceptable, I don't think any of the participants care if Camerfirma has a root accepted; given the issues previously identified and the responses to those issues, I think a number of participants would be just as happy if Camerfirma doesn't get accepted. > > [...] A complete revocation of any SSL certificate issued by 2016 root [...] There are at least a couple of problems with this 1. Revocation, while a useful tool to have, there are a number of issues surrounding it, including distribution of those revocations. Given that the root isn't currently trusted it doesn't make sense for Mozilla to start trusting it but also need to ship a bunch of revocations for mis-issued certificates from it. 2. Given the issues that have already occured with this root, there is going to be questions of whether all the certificates that it has issued are properly recorded, so that they can now be revoked. That is, given the existing issues, how can Mozilla be confident that all the certificates will be revoked. This is not a question of willingness, but rather capability to identify and revoke all the certificates signed by this root. -- Tom _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

