Earlier in this thread, Ryan Sleevi wrote:
> For what it’s worth, I think you can separate out the replacement part with
> the remediation part.
Hi Ryan (Dickson).
Regarding your first thought, I understand you're stating that replacing
("modifying") root certificates is something that CAs are permitted to do
today; and indeed, I haven't yet seen anyone suggest otherwise.
However, I'm not clear if you intended your post to also convey an opinion on
Ryan Sleevi's view (expressed at
https://www.mail-archive.com/[email protected]/msg00224.html and
in https://bugzilla.mozilla.org/show_bug.cgi?id=1741777) that the GTS and
Sectigo root replacement plans will not actually remediate the perceived
non-compliance issue. Please could you clarify the Chrome Root Authority
Program's view on this?
________________________________
From: 'Ryan Dickson' via [email protected]
<[email protected]>
Sent: 08 December 2021 12:58
To: Kathleen Wilson <[email protected]>
Cc: [email protected] <[email protected]>; Ryan
Sleevi <[email protected]>; Ben Wilson <[email protected]>
Subject: Re: Root Replacement with digitalSignature Key Usage to Sign OCSP
responses
CAUTION: This email originated from outside of the organization. Do not click
links or open attachments unless you recognize the sender and know the content
is safe.
[Posting on behalf of Google Chrome]
Hi Ben,
A few thoughts for last week's discussion, sorry for the delay:
1. We do not feel that this discussion should delay Sectigo’s remediation
planning to align with the BRs or the inclusion of any other approved root that
previously performed the same type of certificate modification. Unless/until
this behavior is explicitly prohibited, it’s unfair to change course now.
2. The primary concern in Sectigo’s case is that their Web PKI CP and CPS
indicate, “Sectigo does not offer Certificate modification. Instead, Sectigo
will revoke the old Certificate and issue a new Certificate as a replacement.”
3. Long-term, to reduce the potential for interoperability issues and
promote simplicity, should we look to prohibit both CA certificate renewal and
modification and instead promote the establishment of new CAs (encouraging
crypto agility) - either through the BRs or by way of root program
requirements? If this discussion is best served in a separate thread to avoid
detracting from the immediate issue at hand, no problem.
4. In the spirit of points above, and alongside personal views shared by
Ryan Sleevi, a root transition and subsequent CA decommissioning would be the
optimal path forward to comply with the commitments made in Sectigo’s policies
and, by extension, the BRs.
Thanks,
Ryan
On Thu, Dec 2, 2021 at 4:29 PM Kathleen Wilson
<[email protected]<mailto:[email protected]>> wrote:
>> replacement is separate from, and neither here nor there, for remediation
>> of the issue, objectively and technically speaking
Given this information, and that Bug
#1735407<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbugzilla.mozilla.org%2Fshow_bug.cgi%3Fid%3D1735407&data=04%7C01%7Crob%40sectigo.com%7C2f9e1c34660c4428144008d9ba4a7e6f%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C637745651391967968%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=Lp7O2BfZ230jSDSz%2FRx6gi%2BT%2Fc0X6CCkzLhM1Li5HfY%3D&reserved=0>
is about replacing currently-included root certificates so it does not add
risk, I will keep Bug
#1735407<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbugzilla.mozilla.org%2Fshow_bug.cgi%3Fid%3D1735407&data=04%7C01%7Crob%40sectigo.com%7C2f9e1c34660c4428144008d9ba4a7e6f%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C637745651391967968%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=Lp7O2BfZ230jSDSz%2FRx6gi%2BT%2Fc0X6CCkzLhM1Li5HfY%3D&reserved=0>
in the December 2021 batch of root changes.
Thanks,
Kathleen
--
You received this message because you are subscribed to the Google Groups
"[email protected]<mailto:[email protected]>" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
[email protected]<mailto:[email protected]>.
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/98f61dfe-6389-4fbb-b611-fe73b336addbn%40mozilla.org<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google.com%2Fa%2Fmozilla.org%2Fd%2Fmsgid%2Fdev-security-policy%2F98f61dfe-6389-4fbb-b611-fe73b336addbn%2540mozilla.org%3Futm_medium%3Demail%26utm_source%3Dfooter&data=04%7C01%7Crob%40sectigo.com%7C2f9e1c34660c4428144008d9ba4a7e6f%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C637745651391977930%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=ZjhrgXDnjyP0zzATuh9YR%2FqH%2Bzi7e7MT9lHHeYHXjs4%3D&reserved=0>.
--
You received this message because you are subscribed to the Google Groups
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
[email protected]<mailto:[email protected]>.
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CADEW5O9YnCy3%2Bcgcygs084Q4_bg_4i5xqrLseK_Syb3NqL7puw%40mail.gmail.com<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google.com%2Fa%2Fmozilla.org%2Fd%2Fmsgid%2Fdev-security-policy%2FCADEW5O9YnCy3%252Bcgcygs084Q4_bg_4i5xqrLseK_Syb3NqL7puw%2540mail.gmail.com%3Futm_medium%3Demail%26utm_source%3Dfooter&data=04%7C01%7Crob%40sectigo.com%7C2f9e1c34660c4428144008d9ba4a7e6f%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C637745651391987882%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=jEekjDApqUxHXlE%2Bsa%2BZy9hpfsT9aoSEN1lf3jS6eLo%3D&reserved=0>.
--
You received this message because you are subscribed to the Google Groups
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/MW4PR17MB4729D1AB85AFBD8C86E5F1F2AA719%40MW4PR17MB4729.namprd17.prod.outlook.com.