Ian G wrote:
The goals of Mozo are written somewhere else, and they only speak
softly to the issue of security from memory. I think it is worth
revisiting them, perhaps someone has them to hand?
Are you referring to the high-level goals of the Mozilla Foundation (not
necessarily security-related)? The goals at the highest level are
expressed traditionally by the mission statement "promote choice and
innovation on the Internet". More recently we have the Mozilla Manifesto
as an expanded statement of principles and goals:
http://www.mozilla.org/about/manifesto
Note that the Manifesto does address security-related concerns in a
couple of places, most notably principles 4 and 8.
Going down a level, to my knowledge we (still) don't have a single
authoritative document that addresses the topic of overall security
goals for Firefox or other Mozilla products. However Johnathan
Nightingale has blogged a lot on this topic, and I suspect one could put
together such a document based on what Johnathan and others have written.
Turning to the question of CAs specifically, the most complete (and
unofficial) take on the question is probably my CA certificate
"meta-policy" document:
http://hecker.org/mozilla/ca-certificate-metapolicy
(Though note that I haven't read it in detail for quite a while, and
it's possible that my thinking may have changed in at least one or two
areas.)
I would interpolate the policy goals from the following snippets:
"based on the benefits and risks of such inclusion
to typical users of those product"
"would cause undue risks to users' security"
"might cause technical problems with the operation
of our software"
"provide some service relevant to typical users of
our software products;"
These speak to higher level goals.
That language in the policy was probably my adaption of points 5 and 6
in the CA certificate metapolicy. My main thinking at the time revolved
around the idea of treating PKI and inclusion of CA certs in the context
of overall product security, with trade-offs made as appropriate to
balance risks and benefits to typical users.
If I were to rewrite the metapolicy today, I'd probably explore two
additional points:
* treating the EV case differently than the non-EV case
* not having a "one size fits all" policy for CAs, but looking at CAs in
context, at least to some extent
(To expand on the latter point, what I mean by "in context" includes
things like whether the CA is government-operated vs. private sector,
which geographic and vertical markets it serves, what its market share
is, etc.)
If anything, Frank seems to be implying a goal of "reasonable
efficiency" but that seems to not need to be stated. If anything,
he's talking about the efficiency of the tools that meet the higher
level goals (whatever they are), not the higher level goals.
I'm not sure what you mean by "reasonable efficiency" in this context.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto