Re: Name-constraining government CAs, or not

2015-05-31 Thread Eric Mill
On Sun, May 31, 2015 at 6:43 PM, Ryan Sleevi < ryan-mozdevsecpol...@sleevi.com> wrote: > On Sat, May 30, 2015 2:47 pm, Brian Smith wrote: > > The main sticks that browsers have in enforcing their CA policies is the > > threat of removal. However, such a threat seem completely empty when > > rem

Re: Name-constraining government CAs, or not

2015-05-31 Thread Brian Smith
On Sun, May 31, 2015 at 12:43 PM, Ryan Sleevi < ryan-mozdevsecpol...@sleevi.com> wrote: > However, that you later bring in the idea that government's may pass laws > that make it illegal for browsers to take enforcement is, arguably, > without merit or evidence. If we accept that "governments may

Re: Name-constraining government CAs, or not

2015-05-31 Thread Peter Bowen
On Sun, May 31, 2015 at 3:43 PM, Ryan Sleevi wrote: > On Sat, May 30, 2015 2:47 pm, Brian Smith wrote: >> IIRC, in the past, we've seen CAs that lapse in compliance with Mozilla's >> CA policies and that have claimed they cannot do the work to become >> compliant again until new legislation has

Re: Name-constraining government CAs, or not

2015-05-31 Thread Ryan Sleevi
On Sat, May 30, 2015 2:47 pm, Brian Smith wrote: > It seems reasonable to assume that governments that have publicly-trusted > roots will provide essential government services from websites secured > using certificates that depend on those roots staying publicly-trusted. > Further, it is likely

Re: Policy about root cert transfers

2015-05-31 Thread Wayne Thayer
I agree with Peter that the policy shouldn’t detail the steps for Physical Relocation. As written, it seems to confuse offline roots with online issuing CAs that are typically housed in a data center. Moving a CA’s online operations to a new data center is quite different from moving parts of a