* Eddy Nigg:
> On 01/22/2009 11:04 AM, Florian Weimer:
>> * Eddy Nigg:
>>
>>> As a matter of fact, most CAs have policies in place which require
>>> them upon knowledge of potential or *suspected* compromise to revoke
>>> ANY certificate. I'm certain those policies exist for the top CAs
>>> covering the majority of certificates. The keys are compromised, not
>>> only suspected to be compromised. It's known which keys and
>>> certificates are affected (by the CAs themselves).
>>
>> Yes, but we don't know all the CAs that exist and are recognized by
>> Mozilla. 8-(
>
> Of course we know. It's right here:
> http://lxr.mozilla.org/mozilla/source/security/nss/lib/ckfw/builtins/certdata.txt
The list doesn't include sub-CAs, which are equivalent to listed CAs
for all practical purposes. It's also difficult to match the blobs to
legal entities ("Equifax" comes to my mind).
>> If you've got a sub-CA under a browser-listed root CA, it's kind of
>> hard for Mozilla or the root CA to enforce any rules (let alone detect
>> violations).
>
> No it's quite easy to do that.
For Mozilla? How so?
>> What about requiring that all certificates must be published by the CA
>> (including sub-CAs)?
>
> I don't know the benefit for it,
Transparency. You can actually check what's in those CRLs and what
kind of mistakes are being covered up.
> but I guess that sub CAs could be published, end-user certificates
> most likely not.
Why not?
--
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto