On Tue, Apr 3, 2018 at 8:19 AM, ramirommunoz--- via dev-security-policy <
[email protected]> wrote:

> El martes, 3 de abril de 2018, 11:58:49 (UTC+2), [email protected]
> escribió:
> > On Monday, 2 April 2018 19:22:02 UTC+2, [email protected]  wrote:
> > > El lunes, 2 de abril de 2018, 3:53:08 (UTC+2), Tom Prince  escribió:
> > > > On Sunday, April 1, 2018 at 4:16:47 AM UTC-6, [email protected]
> wrote:
> > > > > I fully understand the proposed solution about 2018 roots but as I
> previously said some concerns arise, [...]
> > > >
> > > >
> > > > That is unfortunate for Camerfirma, but it is not Mozilla or this
> lists issue. While people have provided some suggestions on how you can
> create a root that *might* be acceptable, I don't think any of the
> participants care if Camerfirma has a root accepted; given the issues
> previously identified and the responses to those issues, I think a number
> of participants would be just as happy if Camerfirma doesn't get accepted.
> > > >
> > >
> > > Hi Tom
> > > I'm just trying to provide a different scenario than create a new
> root. Sure that many participants do not care about our particular
> situation:-(, but this make a big difference for us and also for our
> customers. If the only way to going forward is to create a new root, we
> will do it, but our obligation is trying to provide a more convenient
> solution for Camerfirma without jeopardize the trustworthiness of the
> ecosystem.
> >
> > Creating a new root by itself will not solve anything. The problem you
> have is with trust. It's up to you to offer a root that can be used as a
> trust anchor. Reasons why the 2016 root has become unsuitable for this have
> been discussed in detail.
> >
> > The way out can be creating a new root, but that makes only sense
> if/when you are sure all problems have been solved and will not happen with
> the certificates that would be issued from this new root. If you are not
> 100% sure about this, the new root will most likely soon become as useless
> (for thrust) as the old one. Please don't do it before you are ready.
> >
> > CU Hans
>
> Thank Hans for your comments.
>
> Completely agree with you about that a new root by itself do not solve the
> problem.
>
> We have been working on those aspect detected by Wayne at the beginning of
> this thread. CPS issues, CAA issues..etc. So we think we are now ready to
> keep on with the root inclusion. Are we 100% sure ?, No one can assure that
> of their own systems, but we have placed controls to avoid the known
> problems, and detect the unknown ones.
>
> The issue now is choosing the starting point.
>
> 1.- New root 2018
>
> 2.- 2016 root, after revoke all certificates (< 100 units) and pass an
> "Point in Time" BR compliant audit. (Camerfirma proposal)
>
> 3.- We have send two root to the inclusion process. "Chambers of commerce
> root 2016", this is the root which has issue a few(4) missunsed
> certificates https://crt.sh/?cablint=273&iCAID=50473&minNotBefore=2011-
> 01-01, all of them revoked. But we have sent "Chambersign Global Root
> 2016" as well, and this root is free of issuing errors.
>
> Our claim to the community is to use as starting point option 2 or option
> 3.
>

Ramiro,

I don't think option 2 or option 3 really meaningfully address the concerns
being raised here. It's unclear if you don't understand those concerns, or
whether you disagree with those concerns. A root that has not operated
according to expected policy fundamentally is not a good starting point for
trust - there will always be a cloud of suspicion over it, that on a
technical level cannot be ameliorated. In that regard, Option 1 is the only
option that provides a meaningful starting point for trust going forward.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to