On 17/2/2022 5:50 μ.μ., Ryan Sleevi wrote:


On Thu, Feb 17, 2022 at 1:10 AM 'Brittany Randall' via [email protected] <[email protected]> wrote:

    This email begins a 3-week comment period, after which Mozilla is
    expected to consider approval of GoDaddy’s request.

My individual position would be that GoDaddy does not perform this signing unless, and until, https://bugzilla.mozilla.org/show_bug.cgi?id=1727941 is resolved with a positive disposition.

I think there's wide agreement and understanding that the security risks to the community, and to end users, remains, at minimum, the same whether introducing a root or an intermediate, as they both have the same capability. Cross-signing an intermediate versus adding a root largely only functionally differs in that rather than Mozilla and the community reviewing the CA-to-be-signed, the cross-signer performs that review. I don't think we have reason to be confident in the general case that CAs are effective at upholding the same principles or thoroughness as the current Mozilla process was designed to engage and promote. I don't mean this as a slight against GoDaddy, but rather the general principle.


I believe this is not correct. The security risks to the community are different because in the cross-signing/externally-operated subCA model, the Subordinate is under the close supervision of the signing (already publicly-trusted) CA, compared to the individual Root which stands on its own.

The public review policy for intermediates was designed to address this gap, by ensuring intermediates and roots undergo the same level of public review and consideration. It applies for two cases:
1) Where the CA-to-be-signed does not plan to operate as a root
2) Where the CA-to-be-signed does plan to operate as a root (as is the case here)

Strangely, 1) is a bit academic, because there's very little compelling reason to pursue that path given the above considerations, so it's not surprising that we find ourselves in 2).

There are cases where a CA wants to operate independently, without any third-party supervision. This is the most common scenario that's why option 2 is what we usually see. However, there are cases where a company wants to operate a subCA under the guidance and supervision of another CA, which uses option 1. CCADB includes cases that prove that both options exist today.

This is not to say that the trust impact of an externally-operated Sub CA vs a Root CA are not similar, but it is reasonable to assume that when an already-trusted CA member of this community (in good standing)

-  accepts the liability and reputational risks,
-  places sufficient controls to monitor the operations/compliance program of an externally-operated SubCA,

it is sufficient for the community to accept. Taking it one step further, I would say that this scenario (operating under the guidance/supervision of an already-trusted Root CA) is actually MORE trustworthy than an independent Root being accepted for which the community has no visibility about internal operations/compliance program apart from an audit report and self-evaluation.

I assume that GoDaddy and any CA that plans to cross-sign a CA that is new to this community, performs a similar analysis/due diligence as Ben and the community does in Root inclusion requests. Three weeks should be sufficient for additional review/scrutiny by any other member but if more time is needed, people can just ask.

For this specific request, besides your good comments about Wayne and his familiarity with existing policies, I will add that Fastly is a very active Interested Party member in the CA/Browser Forum Server Certificate WG with lots of contributions and not just from Wayne.

I believe it would be unfair to delay this application more than the current Mozilla Policy dictates on the grounds that there is a pending Root inclusion request by Certainly. They could just as well not have applied for a Root inclusion.

Dimitris.

--
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/940cb19e-4c91-cc60-73be-2a05d988e4a2%40it.auth.gr.

Reply via email to