On Mon, 26 Nov 2018 18:47:25 -0500 Ryan Sleevi via dev-security-policy <[email protected]> wrote: > CAs have made the case - it was not accepted. > > On a more fundamental and philosophical level, I think this is > well-intentioned but misguided. Let's consider that the issue is one > that the CA had the full power-and-ability to prevent - namely, they > violated the requirements and misissued. A CA is only in this > situation if they are a bad CA - a good CA will never run the risk of > "annoying" the customer.
I would sympathise with this position if we were considering, say, a problem that had caused a CA to issue certs with the exact same mistake for 18 months, rather than, as I understand here, a single certificate. Individual human errors are inevitable at a "good CA". We should not design systems, including policy making, that assume all errors will be prevented because that contradicts the assumption that human error is inevitable. Although it is often used specifically to mean operator error, human error can be introduced anywhere. A requirements document which erroneously says a particular Unicode codepoint is permitted in a field when it should be forbidden is still human error. A department head who feels tired and signs off on a piece of work that actually didn't pass tests, still human error. In true failure-is-death scenarios like fly-by-wire aircraft controls this assumption means extraordinary methods must be used in order to minimise the risk of inevitable human error resulting in real world systems failure. Accordingly the resulting systems are exceptionally expensive. Though the Web PKI is important, we should not imagine for ourselves that it warrants this degree of care and justifies this level of expense even at a "good CA". What we can require in policy - and as I understand it Mozilla policy does require - is that the management (also humans) take steps to report known problems and prevent them from recurring. This happened here. > This presumes that the customer cannot take steps to avoid this. > However, as suggested by others, the customer could have minimized or > eliminated annoyance, such as by ensuring they have a robust system > to automate the issuance/replacement of certificates. That they > didn't is an operational failure on their fault. I agree with this part. > This presumes that there is "little or no risk to relying parties." > Unfortunately, they are by design not a stakeholder in those > conversations It does presume this, and I've seen no evidence to the contrary. Also I think I am in fact a stakeholder in this conversation anyway? > I agree that it's entirely worthless the increasingly implausible > "important" revocations. I think a real and meaningful solution is > what is being more consistently pursued, and that's to distrust CAs > that are not adhering to the set of expectations. I don't think root distrust is an appropriate response, in the current state, to a single incident of this nature, this sort of thing is, indeed, why you may remember me suggesting that Mozilla needs other mechanisms short of distrust in its arsenal. Nick. _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

