Gervase Markham wrote:
> Frank Hecker wrote:
>> It's a reasonable proposal, and we did look into doing this. 
>> Unfortunately there are .com domains and perhaps other non-.kr domains 
>> with certs issued by CAs in the KISA-rooted hierarchy. This is not 
>> unique to KISA and Korea either AFAIK. 
> 
> I personally think that, if all the other technical capabilities in 
> place, our response to that could reasonably be "Tough. Sorry.".

Note that if we implemented a general enough facility then we wouldn't 
necessarily have to exclude support of all domains outside the country's 
TLD. For example, we could have a constraint permitting use of *.kr (or 
whatever) domains, as well as a selected set of *.com or other domains. 
This would be unwieldy or downright unpractical in cases where a 
government wants to establish lots of .com domains, but might work OK 
for cases where a government has just a few non-country-TLD domains.

>> In the current state of affairs I don't think we have any general way 
>> to restrict government CAs or other country-specific CAs to issuing 
>> certs under their particular national TLDs; we'd need to have 
>> additional code in NSS or PSM to enforce custom restrictions. (Or just 
>> not include the roots at all.)
> 
> As Nelson says, this is a capability we don't have. I personally think 
> we should.

My checkbook is open :-) However note that before doing this I think we 
should make sure we have a full up-to-spec implementation of existing 
standards around CA name constraints. Then we can think about extending 
the constraints to include Mozilla-specific requirements.

Frank

-- 
Frank Hecker
[EMAIL PROTECTED]
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to