On Mon, Apr 23, 2018 at 6:12 PM, Wayne Thayer via dev-security-policy <
[email protected]> wrote:

> I'm re-sending this with the subject tagged as a 'policy 2.6 proposal' in
> case anyone missed it the first time.
>
> I am leaning toward option 2 as the best solution. The scope of section 8
> could be updated to state the following:
>
> CAs SHOULD NOT assume that trust is transferable. All CAs whose
> certificates are included in Mozilla's root program MUST notify Mozilla if:
>
> * ownership or control of the CA’s included certificate(s) changes; or,
> * the CA creates an unconstrained intermediate certificate as defined in
> section 5.3.2 that is controlled by another organization; or,
> * ownership or control of the CA's unconstrained intermediate
> certificate(s) changes; or,
> * ownership or control of the CA’s operations changes; or,
> * there is a material change in the CA's operations.
>
>
> This would then explicitly require CAs who create or transfer an
> unconstrained intermediate certificate to a 3rd party to obtain approval
> and meet the other requirements outlined in section 8.
>
> I would appreciate everyone's comments on this proposed change.
>

Apologies if I'm missing something, but I'm curious how this would cover
the case of:

Org A - "TSP" operating a singular root certificate in the Mozilla program
Org B - "TSP" operating a single signed intermediate from Org A's Root
Certificate
Org C - "TSP" operating a single signed intermediate from Org B's
"Intermediate Certificate"
Org D - A new TSP

My understanding is that the proposed language would address the situation
if Org B transferred control to org D, but I'm struggling to see where/how
it would require Org C to be subject to that if they transferred to Org D.

The ambiguity that I struggle with comes from "control of the CA's" (in the
third bullet) that seems subject to "All CAs whose certificates are
included in Mozilla's root program" in the intro. It would seem it would
only bind the Org A relationship, not Org B's.

In this regard, 5.3.2 is slightly less ambiguous, as it governs "All
certificates that are capable of being used to issue new certificates, and
which directly or transitively chain to a certificate included in Mozilla’s
CA Certificate Program,"
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to