Re: DarkMatter CAs in Google Chrome and Android

2019-07-25 Thread okaphone.elektronika--- via dev-security-policy
I did not consider it useful to say it, so I didn't. But I was certainly thinking that "try... over the heads of people who make the decision" bit, when the "appeal" got posted. ;-) Is there such a thing as a right to be trusted? Interesting question... I would say there isn't, trust cannot be

Re: Certinomis Issues

2019-05-11 Thread okaphone.elektronika--- via dev-security-policy
On Friday, 10 May 2019 19:00:11 UTC+2, Wayne Thayer wrote: ... > I share the concern that option #2 sends a confusing message. As Jonathan > stated, why should we distrust a CA for all but the most important websites > they secure? I'd say that both "too big to fail" and "too important to

Re: A modest proposal for a better BR 7.1

2019-03-08 Thread okaphone.elektronika--- via dev-security-policy
On Saturday, 9 March 2019 03:44:12 UTC+1, Matthew Hardeman wrote: > I know this isn't the place to bring a BR ballot, but I'm not presently a > participant there. > > I present alternative language along with notes and rationale which, I put > forth, would have resulted in a far better outcome

Re: Pre-Incident Report - GoDaddy Serial Number Entropy

2019-03-08 Thread okaphone.elektronika--- via dev-security-policy
On Friday, 8 March 2019 17:07:57 UTC+1, Wayne Thayer wrote: > I've created https://bugzilla.mozilla.org/show_bug.cgi?id=1533774 to track > this issue. > > Apple has also submitted the following bug for this issue listing a large > number of impacted certificates: >

Re: EJBCA defaulting to 63 bit serial numbers

2019-03-08 Thread okaphone.elektronika--- via dev-security-policy
On Friday, 8 March 2019 04:28:17 UTC+1, Matt Palmer wrote: > On Thu, Mar 07, 2019 at 09:03:22PM -0600, Matthew Hardeman via > dev-security-policy wrote: > > On Thu, Mar 7, 2019 at 8:54 PM bif via dev-security-policy < > > dev-security-policy@lists.mozilla.org> wrote: > > > But BRs are not to be

Re: Fond Farewell to Gerv Markham

2018-07-29 Thread okaphone.elektronika--- via dev-security-policy
We will miss him. ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

Re: Sigh. stripe.ian.sh back with EV certificate for Stripe, Inc of Kentucky....

2018-04-13 Thread okaphone.elektronika--- via dev-security-policy
"... don't START inventing and applying any unwritten new rules..." ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

Re: Sigh. stripe.ian.sh back with EV certificate for Stripe, Inc of Kentucky....

2018-04-13 Thread okaphone.elektronika--- via dev-security-policy
On Thursday, 12 April 2018 21:28:49 UTC+2, Alex Gaynor wrote: > All that proves is the entire EV model cannot possibly accomplish what CAs > claims (with respect to phishing and other similar concerns). To whit: > > - Two companies can validly possess trademarks for the same name in the > United

Re: c=US policy layer in development

2018-04-10 Thread okaphone.elektronika--- via dev-security-policy
On Tuesday, 10 April 2018 01:06:36 UTC+2, Peter Bachman wrote: > https://groups.google.com/forum/#!forum/cus-policy-layer Can you give us a few words, with the links you drop here? It would be nice. Especially when in order to see what the link is about you must first become a member of the

Re: AC Camerfirma Chambers of Commerce and Global Chambersign 2016 Root Inclusion Request

2018-04-03 Thread okaphone.elektronika--- via dev-security-policy
On Tuesday, 3 April 2018 14:19:43 UTC+2, ramiro...@gmail.com wrote: > El martes, 3 de abril de 2018, 11:58:49 (UTC+2), okaphone.e...@gmail.com > escribió: > > On Monday, 2 April 2018 19:22:02 UTC+2, ramiro...@gmail.com wrote: > > > El lunes, 2 de abril de 2018, 3:53:08 (UTC+2), Tom Prince

Re: AC Camerfirma Chambers of Commerce and Global Chambersign 2016 Root Inclusion Request

2018-04-03 Thread okaphone.elektronika--- via dev-security-policy
On Monday, 2 April 2018 19:22:02 UTC+2, ramiro...@gmail.com wrote: > El lunes, 2 de abril de 2018, 3:53:08 (UTC+2), Tom Prince escribió: > > On Sunday, April 1, 2018 at 4:16:47 AM UTC-6, ramiro...@gmail.com wrote: > > > I fully understand the proposed solution about 2018 roots but as I > > >

Re: TunRootCA2 root inclusion request

2018-03-15 Thread okaphone.elektronika--- via dev-security-policy
On Thursday, 15 March 2018 04:30:22 UTC+1, syri...@gmail.com wrote: > Dear Wayne, > Based on the long discussion regarding our request, I would appreciate having > your opinion on the following: > Move to a new root based on EJBCA (Enterprise License) and conduct a new > audit with a new

Re: Following up on Trustico: reseller practices and accountability

2018-03-05 Thread okaphone.elektronika--- via dev-security-policy
On Monday, 5 March 2018 18:10:17 UTC+1, okaphone.e...@gmail.com wrote: > On Monday, 5 March 2018 15:44:20 UTC+1, Eric Mill wrote: > > I think it probably makes more sense to focus on sensitive key material > > than non-sensitive CSRs. > > > > As a starting point, how reasonable would it be for

Re: Following up on Trustico: reseller practices and accountability

2018-03-05 Thread okaphone.elektronika--- via dev-security-policy
On Monday, 5 March 2018 15:44:20 UTC+1, Eric Mill wrote: > I think it probably makes more sense to focus on sensitive key material > than non-sensitive CSRs. > > As a starting point, how reasonable would it be for CAs to question their > resellers, or to disseminate additional language to add to

Re: Following up on Trustico: reseller practices and accountability

2018-03-05 Thread okaphone.elektronika--- via dev-security-policy
On Sunday, 4 March 2018 22:44:26 UTC+1, Paul Kehrer wrote: > On March 4, 2018 at 5:06:41 PM, Eric Mill via dev-security-policy ( > dev-security-policy@lists.mozilla.org) wrote: > > > > It's also clear from the experience that rules of the road for resellers > are unclear, and that

Re: PROCERT issues

2017-09-27 Thread okaphone.elektronika--- via dev-security-policy
On Wednesday, 27 September 2017 18:56:27 UTC+2, Kathleen Wilson wrote: > In past incidents, we have provided a list of action items that the CA must > complete before they can be re-included in Mozilla's root store. > > What action items do you all think PROCERT should complete before they can

Re: Certificates with invalidly long serial numbers

2017-08-10 Thread okaphone.elektronika--- via dev-security-policy
The answers from CAs we typically see in this group are more along the lines of not thinking it necessary to revoke at all than needing more time, I'd say. So I don't really see what this idea that 24 hours would be too short is based on. I think relaxing the revocation time limit may in fact

Re: StartCom cross-signs disclosed by Certinomis

2017-08-04 Thread okaphone.elektronika--- via dev-security-policy
On Friday, 4 August 2017 03:16:45 UTC+2, Matt Palmer wrote: > On Thu, Aug 03, 2017 at 01:43:08PM -0700, Kathleen Wilson via > dev-security-policy wrote: > > However, I think it is fine for Certinomis to cross-sign with new StartCom > > subCA certs, as long as Certinomis ensures that Mozilla's

Re: StartCom cross-signs disclosed by Certinomis

2017-08-03 Thread okaphone.elektronika--- via dev-security-policy
On Thursday, 3 August 2017 02:12:18 UTC+2, Matt Palmer wrote: > On Wed, Aug 02, 2017 at 06:38:44PM -0400, Jonathan Rudenberg via > dev-security-policy wrote: > > I think the correct response is to add both intermediates to OneCRL > > immediately, especially given the historic issues with

Re: Final Decision by Google on Symantec

2017-07-28 Thread okaphone.elektronika--- via dev-security-policy
On Friday, 28 July 2017 08:15:43 UTC+2, Gervase Markham wrote: > Google have made a final decision on the various dates they plan to > implement as part of the consensus plan in the Symantec matter. The > message from blink-dev is included below. > > Most of the dates have consensus - the dates

Re: WoSign new system passed Cure 53 system security audit

2017-07-14 Thread okaphone.elektronika--- via dev-security-policy
On Friday, 14 July 2017 04:44:39 UTC+2, Richard Wang wrote: > Hi Peter, > > Thanks for your guesses. > Buy no those issues in our system. > > > Best Regards, > > Richard That's what you say. But you've lied before. :-( So sorry, but that won't go anywhere near regaining trust. You'll have

Re: WoSign new system passed Cure 53 system security audit

2017-07-11 Thread okaphone.elektronika--- via dev-security-policy
On Monday, 10 July 2017 08:55:38 UTC+2, Richard Wang wrote: > > Please note this email topic is just for releasing the news that WoSign new > system passed the security audit, just for demonstration that we finished > item 5: > " 5. Provide auditor[3] attestation that a full security audit of

Re: Symantec: Update

2017-05-12 Thread okaphone.elektronika--- via dev-security-policy
On Thursday, 11 May 2017 19:08:06 UTC+2, Gervase Markham wrote: > On 11/05/17 13:02, wiz...@ida.net wrote: > > That said, it is fair point that the plan should spell out what happens if > > symantec does not cooperate. > > I think we should cross that bridge when we come to it, which I hope we

Re: Symantec: Update

2017-05-10 Thread okaphone.elektronika--- via dev-security-policy
On Wednesday, 10 May 2017 17:52:40 UTC+2, Gervase Markham wrote: > On 09/05/17 16:51, Gervase Markham wrote: > > * Editing the proposal to withdraw the "alternative" option, leaving > > only the "new PKI" option. > > This has now been done: > >

Re: Symantec: Draft Proposal

2017-05-08 Thread okaphone.elektronika--- via dev-security-policy
Hi Rick, I don't see a "May 4th post". Where was it posted? Not here it seems. Also it's reasonable that Symantec wants to "address impact to their customers" but what about impact to all of the browsers users? It may be a good idea to try and address (in your proposals) that to. So far I

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-27 Thread okaphone.elektronika--- via dev-security-policy
On Thursday, 27 April 2017 00:42:20 UTC+2, Ryan Sleevi wrote: > On Wed, Apr 26, 2017 at 5:17 PM, okaphone.elektronika--- via > dev-security-policy <dev-security-policy@lists.mozilla.org> wrote: > > > > If this is about the possible consequences of compromise, then I'

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-26 Thread okaphone.elektronika--- via dev-security-policy
On Wednesday, 26 April 2017 22:43:19 UTC+2, Ryan Sleevi wrote: > On Wed, Apr 26, 2017 at 4:02 PM, okaphone.elektronika wrote: > > > I think this is getting weird. > > > > At first (some other thread) it get's explained that e.g. LetsEncrypt does > > not do anything beyond domain validation and

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-26 Thread okaphone.elektronika--- via dev-security-policy
I think this is getting weird. At first (some other thread) it get's explained that e.g. LetsEncrypt does not do anything beyond domain validation and possibly on notification take down a few certificates of phishing site. And that was "... all OK because we want SSL to be used everywhere, and

Re: Researcher Says API Flaw Exposed Symantec Certificates, Including Private Keys

2017-03-30 Thread okaphone.elektronika--- via dev-security-policy
On Wed, Mar 29, 2017 at 3:22 AM, okaphone.elektronika--- via > dev-security-policy <dev-security-policy@lists.mozilla.org> wrote: > > > Weird. > > > > I expect there are no requirements for a CA to keep other people's private > > keys safe. After all

Re: Researcher Says API Flaw Exposed Symantec Certificates, Including Private Keys

2017-03-29 Thread okaphone.elektronika--- via dev-security-policy
Weird. I expect there are no requirements for a CA to keep other people's private keys safe. After all handling those is definitely not part of being a CA. ;-) CU Hans ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org

Re: Google Trust Services roots

2017-03-27 Thread okaphone.elektronika--- via dev-security-policy
It's probably my ignorance in these matters, but how does purchasing a root certificate affect revocation? Will that remain the responsibility of GlobalSign for any existing certificates that have been signed with these roots? (Those would be intermediate certificates, if I understand

Re: Suspicious test.com Cert Issued By GlobalSign

2017-03-17 Thread okaphone.elektronika--- via dev-security-policy
On Friday, 17 March 2017 17:28:12 UTC+1, douglas...@gmail.com wrote: > On Friday, March 17, 2017 at 5:37:38 AM UTC-4, Gervase Markham wrote: > > On 16/03/17 17:20, douglas beattie wrote: > > > Yes, RAs (trusted role employees) need to have the technical ability > > > to manually add domains to

Re: Intermediates Supporting Many EE Certs

2017-03-01 Thread okaphone.elektronika--- via dev-security-policy
On Wednesday, 1 March 2017 12:44:16 UTC+1, Gervase Markham wrote: > On 13/02/17 12:23, Gervase Markham wrote: > > The GoDaddy situation raises an additional issue. > > > What can be done about the potential future issue (which might happen > > with any large CA) of the need to untrust a

Re: Intermediates Supporting Many EE Certs

2017-02-15 Thread okaphone.elektronika--- via dev-security-policy
On Wednesday, 15 February 2017 18:27:28 UTC+1, Gervase Markham wrote: > On 13/02/17 17:34, okaphone.elektron...@gmail.com wrote: > > Isn't this mostly something that CAs should keep in mind when they > > setup "shop"? > > > > I mean it would be nice to have a way of avoiding that kind of impact