On Tue, Apr 21, 2020 at 1:48 AM Matt Palmer via dev-security-policy <
[email protected]> wrote:

> That ship sailed so very, very long ago, though.


No it hasn’t. These are much easier to remove than to add new dependencies.
We’re already seeing progress in addressing some of the ambiguities in the
base certificate profiles in the CABF (via the validation WG), and while
that effort is not necessarily to remove things, it does make it easier to
make sure everyone is on the same page about what is permitted and good.

Part of the goal is to make sure it’s clear precisely when and where
flexibility exists, so we can make sure that flexibility balances all of
the stakeholder needs.

> 2. Make the cPSuri actually point to the relevant CPS
> >
> > That doesn’t really capture what a CPS is. There can be many relevant
> CPSes
> > to a single certificate, both for a single path and multiple paths.
> That’s
> > literally how audits came to be - to support the model of multiple CPSes.
>
> >From what I can see in a CSV o' Doom, a CA can only provide a single CPS
> link for a given intermediate.  That does rather suggest that there's only
> one CPS for a given certificate.


That’s something Kathleen is literally in the process of fixing :)

> Do you disagree? If Mozilla Policy made normative that there be some form
> > of binding problem reporting statement for each issuer certificate, would
> > that address your problem or not?
>
> Not particularly, because while problem reporting addresses are the major
> part of why I have gone looking for CPSes in the recent past, it is not the
> only reason.


Not as helpful as a reply ;) What are the other reasons, so we can better
understand the challenges you’re facing, and find solutions that balance
those needs better? :)
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to