On Friday, February 22, 2019 at 10:21:24 PM UTC+1, Wayne Thayer wrote:
> We are not aware of direct evidence of misused
> certificates in this case. However, the evidence does strongly suggest that
> misuse is likely to occur, if it has not already.

So, basing the trust of a CA on "suggestion" and crystal-ball like "looking 
into the future" (asserting they _will_ abuse their power) without a shred of 
conclusive evidence is considered good practice, now? Aren't the rules for 
admission of a CA in root stores there for a reason (among others to keep the 
process objective)?
Not like all the other ones in the root stores have spotless historical records 
either. Far from it.

> I don't see how approving them, or the continued trust in their 
> intermediates, would be in the interests of Mozilla's users or compatible 
> with the Mozilla Manifesto.

Oh come on. Mozilla itself isn't compatible with the Mozilla Manifesto.

Also, I don't see how a corporate organization's manifesto should have any 
bearing on the truststore used in many independent FOSS operating systems and 
applications. Mozilla might not agree with many things based on political bias 
and let's leave that out the door, shall we? Or do you want to start refusing 
or distrusting CAs that have any sort of affiliation with right-wing political 
parties next?
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to