Frank Hecker:
> Eddy Nigg (StartCom Ltd.) wrote:
>> Nor am I a citizen of Zimbabwe, so it doesn't apply 
>> to me either... I guess I represent in that respect the majority of a 
>> typical user.
>>     
>
> I'm not sure where the reference to Zimbabwe came from, but never mind...
>   

LOL...I think that's because that country was just up in the news...it 
could have been any other country - USA, Denmark, Argentina....anything...

>   
>> Nope, I guess we'll have to find something better then that (if at all).
>>     
>
> I'm still not clear on your exact objections to the Microsoft policy, or 
> what you would consider a better one.
>
>   
I can try to make a suggestion...

First of all I'm guided by a few facts:

I'm not aware that we can limit certificates in any form to whom the 
certificates are going to be issued and we can't limit about who is 
going to be a relying party. Even if a certificate might be primarily 
intended to be used in a respective country, it doesn't prevent such a 
certificate to be used anywhere on the Internet, being it for S/MIME, 
authentication or server.

Therefore I don't see much difference between a so-called government 
issued certificate or a regular one. They act the same, behave the same 
and users rely on them the same. If such certificates are relevant for a 
typical user or not I don't want to decide and leave it up to somebody 
else. It doesn't have any effect on what the certificates are, however I 
suggest that this "requirement" of the policy be either updated or removed.

Because certificates can't be limited (and localized versions with 
different roots isn't what I would suggest generally), we have to apply 
the same conditions and rules to such CAs. This means, their PKI must be 
audited according to one of our criterion by an auditor the policy 
defines as acceptable, The certificates must be issued according to the 
same requirements as all other certificates.

In order to better control and know which CAs we are actually approving 
I'd suggest to exclude CA roots, if their sole or major purpose is the 
boot-strapping of other CAs. Instead each CA should apply for inclusion, 
we might however accept governments themselves as auditors provided the 
audit is confirmed according to one of our accepted criterion (I think 
this is what we did with TurkTrust, this would be possible with some of 
the Austrian CAs once they provide an acceptable audit confirmation, and 
this is what we should do with the Korean CAs).

Beyond that I don't think we have to make any other changes or updates, 
which boils down to:

- No boot-strapping CAs
- Auditing of the complete CA infrastructure is a requirement

This should apply to all CAs the same! This isn't exclusive to 
government CAs.

(We might want to look into issues concerning localization of content 
presented in certificates, but that's an entire different issue (just 
remembered it because I mentioned TurkTrust))

-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to