On Thu, Apr 16, 2020 at 4:09 PM Tim Hollebeek
<[email protected]> wrote:
> On the other hand, for example in Shanghai, some
> have argued that there is nothing wrong with a CPS that does not disclose 
> anything
> about how CAs implement any of the policy requirements.

Understandably, it's a spectrum. For these sorts of implementation
questions, I think this is really an area where the Detailed Control
Reporting ( see
https://cabforum.org/2020/03/20/minutes-for-ca-browser-forum-f2f-meeting-49-bratislava-19-20-february-2020/#WebTrust-Update
for an example) would be helpful here.

In the end, the transparency is about finding the right level of
relevant information that's useful. Complete transparency can be
useful, but can also hide shenanigans in the information overload. We
see this regularly with CP/CPS reviews, in which dozens of CPSes may
have subtle and ill-defined interactions that are only obvious after
hundreds of pages of reading. Figuring out how to better surface
these, through both normative requirements and standardized
disclosures, is the approach.

> I would personally find it very unfortunate if the trend continues, and we 
> have
> increasingly vacuous CPSs that contain no relevant information.  But in the 
> absence
> of requirements to disclose relevant practices, I'm not surprised that that's 
> a trend
> that has been embraced by some CAs.

Figuring out the right transparency for the original problem on the
thread is difficult. Do you think the steps I proposed work? I'm not
confident they do, but I think they might be a useful stepping stone.
Given DigiCert originally raised this, perhaps you have suggestions
for possible means of unambiguously getting disclosure around
revocation practices and policies?
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to