First, my sincere apologies for being missing from this group over the past few weeks. A combination of illness (both my own and family), out-of-town trips, and other Mozilla Foundation business kept me from having any significant time to devote to CA matters. I am working on ways to ensure that I am not the bottleneck in this process in the long term; in the short term I'm going to try to restart CA public discussions on a regular schedule.

Per the CA schedule, the next CA on the list for public comment is WISeKey, which has applied to add its (one) root CA certificate to the Mozilla root store, as documented in the following bug:

  https://bugzilla.mozilla.org/show_bug.cgi?id=371362

and in the pending certificates list here:

  http://www.mozilla.org/projects/security/certs/pending/#WISeKey

WISeKey has been through an initial comment period a while back, during which we got nvolved in a lengthy discussion about WISeKey's Blackbox product (a "CA in a box" product intended for enterprise deployment) and whether and how auditing was done for WISeKey's subordinate CAs associated with that product. WISeKey supplied more information about their arrangements, which you can find in the bug.

We've had some lengthy discussions about the issue of auditing subordinate CAs. I'm not going to rehash all those discussions, I'll just summarize my current thinking:

First, the general issue of auditing subordinate CAs was something we didn't think through much when we did our Mozilla CA policy: We were thinking of a fairly simple model where a CA organization operated both its root CA(s) and also any subordinate CAs under those roots, with a CPS and associated audit that covered the both root and subordinates all. In actual practice things are more complicated, and our policy didn't really capture that complication.

My personal opinion is that it doesn't make sense to try to address this complication by mandating traditional WebTrust-style audits of any and all subordinates under a root. I think this approach is impractical, and I don't think it's necessary. I'd rather look at the overall manner in which CAs exercise controls over subordinates, legally, technically, and otherwise, as well as the general nature of the subordinates and how they function in practice. I think in some cases it might make sense to require audits for all subordinates, and in some cases it might not.

For purposes of this particular evaluation, my goal is for us to gain a shared understanding of what WISeKey actually does, including getting answers to any remaining questions, and then I'll make a judgement call as to whether what WISeKey is doing meets the general intent of our policy.

Frank

--
Frank Hecker
[EMAIL PROTECTED]
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to