Ian G wrote:
The goals of Mozo are written somewhere else, and they only speak
softly to the issue of security from memory.  I think it is worth
revisiting them, perhaps someone has them to hand?

Are you referring to the high-level goals of the Mozilla Foundation (not necessarily security-related)? The goals at the highest level are expressed traditionally by the mission statement "promote choice and innovation on the Internet". More recently we have the Mozilla Manifesto as an expanded statement of principles and goals:

  http://www.mozilla.org/about/manifesto

Note that the Manifesto does address security-related concerns in a couple of places, most notably principles 4 and 8.

Going down a level, to my knowledge we (still) don't have a single authoritative document that addresses the topic of overall security goals for Firefox or other Mozilla products. However Johnathan Nightingale has blogged a lot on this topic, and I suspect one could put together such a document based on what Johnathan and others have written.

Turning to the question of CAs specifically, the most complete (and unofficial) take on the question is probably my CA certificate "meta-policy" document:

  http://hecker.org/mozilla/ca-certificate-metapolicy

(Though note that I haven't read it in detail for quite a while, and it's possible that my thinking may have changed in at least one or two areas.)

I would interpolate the policy goals from the following snippets:

   "based on the benefits and risks of such inclusion
   to typical users of those product"

   "would cause undue risks to users' security"

   "might cause technical problems with the operation
   of our software"

   "provide some service relevant to typical users of
   our software products;"

These speak to higher level goals.

That language in the policy was probably my adaption of points 5 and 6 in the CA certificate metapolicy. My main thinking at the time revolved around the idea of treating PKI and inclusion of CA certs in the context of overall product security, with trade-offs made as appropriate to balance risks and benefits to typical users.

If I were to rewrite the metapolicy today, I'd probably explore two additional points:

* treating the EV case differently than the non-EV case
* not having a "one size fits all" policy for CAs, but looking at CAs in context, at least to some extent

(To expand on the latter point, what I mean by "in context" includes things like whether the CA is government-operated vs. private sector, which geographic and vertical markets it serves, what its market share is, etc.)

If anything, Frank seems to be implying a goal of "reasonable
efficiency" but that seems to not need to be stated.  If anything,
he's talking about the efficiency of the tools that meet the higher
level goals (whatever they are), not the higher level goals.

I'm not sure what you mean by "reasonable efficiency" in this context.

Frank

--
Frank Hecker
[EMAIL PROTECTED]
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to