Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-15 Thread Kathleen Wilson
All, Thank you for your patience throughout this long discussion. I appreciate all of your thoughtful and constructive input. I feel confident now that we should do the following: 1) Remove reference to the code signing trust bit from version 2.3 of Mozilla's CA Certificate Policy. 2) When ve

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-13 Thread Peter Kurrasch
I can't think of a case either. What I'm advocating would be an expansion of Mozilla's role in the security space--something that may or may not be appropriate for me to do, with pros and cons either way.

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-12 Thread Gervase Markham
On 08/10/15 17:20, Peter Bowen wrote: > going forward, so there would be no impact to Mozilla products. That > leaves OpenJDK on Red Hat. It was indicated in an earlier part of > the thread that Red Hat may be basing their trust store on Mozilla’s > trust store. This is the one defined place wher

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-12 Thread Gervase Markham
On 08/10/15 14:27, Peter Kurrasch wrote: > 2. Loss of visibility/consistency/input: If Mozilla decides to exit the > code signing world, the security community loses a place to share > experiences, establish policies, discuss and evaluate bad acts and bad > actors, and so forth I've never seen th

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-08 Thread Peter Bowen
> On Oct 8, 2015, at 6:27 AM, Peter Kurrasch wrote: > > ‎I will cop to being confused about the Linux situation--I thought some issue > had been identified for one of the distros. > > 1. Impacts to specific products: I had hoped that by now we'd be able to > point to specific products that w

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-08 Thread Peter Kurrasch
‎I will cop to being confused about the Linux situation--I thought some issue had been identified for one of the distros.At this point, please allow me to take a step back and try to articulate my current views on

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-06 Thread Matt Palmer
On Tue, Oct 06, 2015 at 01:05:52PM -0500, Peter Kurrasch wrote: > Actually, what is the plan for Linux after the code signing trust bit is > dropped? What would change, such that Linux would have to make plans? - Matt ___ dev-security-policy mailing li

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-06 Thread Daniel Micay
On 06/10/15 02:05 PM, Peter Kurrasch wrote: > Erwann--I checked and Mozilla has a very strict "No Kissing" policy in the > forums, so maybe a handshake will have to suffice. > > I believe Tesla is using a (older?) Ubuntu release in its cars‎. Does anyone > here know if they make any use of the N

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-06 Thread Peter Kurrasch
Erwann--I checked and Mozilla has a very strict "No Kissing" policy in the forums, so maybe a handshake will have to suffice. I believe Tesla is using a (older?) Ubuntu release in its cars‎. Does anyone here know if they make any use of the NSS capabilities in that distro? Actually, what is the

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-06 Thread Rick Andrews
Kathleen, I'll admit that I'm discouraged from contributing. Can you tell us what if anything is being done to keep the discourse at a more respectable level? ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozil

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-05 Thread Erwann Abalea
Le lundi 5 octobre 2015 19:36:03 UTC+2, Peter Kurrasch a écrit : > TL;DR... [...Peter and Ryan more than disagree...] Please, stay cool, kiss each other. > Let's consider a (hypothetical) situation where I'm a manufacturer of > anti-lock braking systems that go into cars made by 5 different comp

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-05 Thread Peter Kurrasch
‎TL;DR...that is until I saw you calling me a concern troll. You make it abundantly clear you believe I am far too ignorant to participate meaningfully in this discussion ‎but I wish you had the humility to ask qu

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-05 Thread Gervase Markham
On 04/10/15 23:02, R Kent James wrote: > You seem to be implying that Thunderbird is no longer a Mozilla > application. Where do you get this idea? No need to get upset, Kent - Kirk's head is in the CA world, not the Mozilla world. Your points about Thunderbird's role are reasonable ones, but let'

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-05 Thread Gervase Markham
On 04/10/15 13:18, kirk_h...@trendmicro.com wrote: > As to whether or not to remove the trust bits for code signing and > email, I guess I would ask: Why did Mozilla include/create the trust > bits in the first place? You would need to ask Netscape :-) > Was it only to support Mozilla application

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-04 Thread R Kent James
On 10/4/2015 5:18 AM, kirk_h...@trendmicro.com wrote: As to whether or not to remove the trust bits for code signing and email, I guess I would ask: Why did Mozilla include/create the trust bits in the first place? Was it only to support Mozilla applications like Thunderbird? Or was it to se

Re: Fwd: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-04 Thread Wayne
On 10/2/2015 12:36 PM, Brian Smith wrote: ... Further, there's been actual evidence presented that Mozilla's S/MIME software is not trustworthy due to lack of maintenance. I tried to find more than just the previously cited https://bugzilla.mozilla.org/show_bug.cgi?id=1178032 but found none. S

RE: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-04 Thread kirk_h...@trendmicro.com
Kurrasch [mailto:fhw...@gmail.com] Sent: Friday, October 02, 2015 9:54 PM To: Kirk Hall (RD-US); dev-security-policy@lists.mozilla.org Subject: Re: Policy Update Proposal: Remove Code Signing Trust Bit Hi Kirk-- Would it be possible to provide some specific examples of the applications you have in

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-02 Thread Ryan Sleevi
On Fri, October 2, 2015 11:53 am, Peter Kurrasch wrote: >One final comment: in terms of the embedded space, without publicly > vetted roots I think it's safe to say that most products will include > whatever root is necessary just to make the product work and that security > concerns might not p

Re: Fwd: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-02 Thread Brian Smith
On Fri, Oct 2, 2015 at 7:41 AM, Joshua Cranmer 🐧 wrote: > On 10/2/2015 11:36 AM, Brian Smith wrote: > >> First of all, there is a widely-trusted set of email roots: Microsoft's. >> Secondly, there's no indication that having a widely-trusted set of email >> roots *even makes sense*. Nobody has sh

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-02 Thread Peter Kurrasch
Hi Kirk--Would it be possible to provide some specific examples of the applications you have in mind? Or maybe some use cases that would be relevant here (in the context of code signing)? My contention has been a

Re: Fwd: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-02 Thread Joshua Cranmer 🐧
On 10/2/2015 11:36 AM, Brian Smith wrote: -- Forwarded message -- From: Brian Smith Date: Thu, Oct 1, 2015 at 7:15 AM Subject: Re: Policy Update Proposal: Remove Code Signing Trust Bit To: Gervase Markham Cc: "kirk_h...@trendmicro.com" On Wed, Sep 30, 2015 a

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-02 Thread Phillip Hallam-Baker
On Fri, Oct 2, 2015 at 12:36 PM, Brian Smith wrote: > -- Forwarded message -- > From: Brian Smith > Date: Thu, Oct 1, 2015 at 7:15 AM > Subject: Re: Policy Update Proposal: Remove Code Signing Trust Bit > To: Gervase Markham > Cc: "kirk_h...@trendmicro.

Fwd: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-02 Thread Brian Smith
-- Forwarded message -- From: Brian Smith Date: Thu, Oct 1, 2015 at 7:15 AM Subject: Re: Policy Update Proposal: Remove Code Signing Trust Bit To: Gervase Markham Cc: "kirk_h...@trendmicro.com" On Wed, Sep 30, 2015 at 11:05 PM, Gervase Markham wrote: > On 0

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-01 Thread Kathleen Wilson
On 10/1/15 2:05 AM, Gervase Markham wrote: On 01/10/15 02:43, Brian Smith wrote: I wish you would have led with these completely ridiculous suggestion instead of the only-slightly-less ridiculous stuff that preceded it. This kind of language, while it does follow the rule of criticising ideas

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-01 Thread Kurt Roeckx
On 2015-10-01 11:05, Gervase Markham wrote: On 01/10/15 02:43, Brian Smith wrote: Perhaps nobody's is, and the whole idea of using publicly-trusted CAs for code signing and email certs is flawed and so nobody should do this. I think we should divide code-signing and email here. I can see how o

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-01 Thread Gervase Markham
On 01/10/15 02:43, Brian Smith wrote: > Perhaps nobody's is, and the whole idea of using publicly-trusted CAs for > code signing and email certs is flawed and so nobody should do this. I think we should divide code-signing and email here. I can see how one might make an argument that using Mozilla

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-30 Thread Matt Palmer
[I'm specifically only responding in the context of code signing certificates; that is what this thread is about, and the issues for the two types of certificates are separate and should remain so] On Thu, Oct 01, 2015 at 01:11:05AM +, kirk_h...@trendmicro.com wrote: > The Mozilla NSS root sto

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-30 Thread Brian Smith
On Wed, Sep 30, 2015 at 3:11 PM, kirk_h...@trendmicro.com < kirk_h...@trendmicro.com> wrote: > The Mozilla NSS root store is used by some well-known applications as > discussed, but also by many unknown applications. If the trust bits are > removed, CAs who issue code signing or email certs may f

Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-30 Thread kirk_h...@trendmicro.com
I checked with our team, and we think it would be a mistake for Mozilla to remove the trust bits for either code signing or email certs. The Mozilla NSS root store is used by some well-known applications as discussed, but also by many unknown applications. If the trust bits are removed, CAs wh

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-25 Thread Gervase Markham
On 24/09/15 16:53, Richard Wang wrote: > I think FireFox plugin XPI need to be signed, this is the usage. That is no longer the case. Gerv ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-24 Thread Richard Barnes
Sent from my iPhone. Please excuse brevity. > On Sep 24, 2015, at 08:56, Richard Wang wrote: > > I think FireFox plugin XPI need to be signed, this is the usage. Those are signed with a specific Mozilla-owned authority, which is independent of the root program. XPI signing does not rely on the

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-24 Thread Richard Wang
I think FireFox plugin XPI need to be signed, this is the usage. Regards, Richard > On Sep 24, 2015, at 20:53, Gervase Markham wrote: > >> On 24/09/15 02:58, Peter Kurrasch wrote: >> I suppose my comment was not as clear as I intended but, yes, I think >> Mozilla's commitment to openness is a

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-24 Thread Kathleen Wilson
On 9/24/15 6:07 AM, Peter Bachman wrote: When the thread starts on the separate S/MIME policy update thread let me know, I work on a project that relies on S/MIME for transferring medical files and want to keep open the FOSS component of that. While that project has a strong server reference i

Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-24 Thread Peter Bachman
When the thread starts on the separate S/MIME policy update thread let me know, I work on a project that relies on S/MIME for transferring medical files and want to keep open the FOSS component of that. While that project has a strong server reference implementation, the private keys are held at

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-24 Thread Gervase Markham
On 24/09/15 02:58, Peter Kurrasch wrote: > I suppose my comment was not as clear as I intended but, yes, I think > Mozilla's commitment to openness is a reason to keep the code sign bit > and continue to review CA inclusion requests for their code signing > roots. I'm not aware of another organizat

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-23 Thread Peter Kurrasch
I suppose my comment was not as clear as I intended but, yes, I think Mozilla's commitment to openness is a reason to keep the code sign bit and continue to review CA inclusion requests for their code signing root

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-21 Thread Kathleen Wilson
On 9/18/15 5:48 AM, Peter Kurrasch wrote: Hi Kathleen, This summary looks pretty good. I think you could add the point raised by Man Ho which essentially asks the question of who should/can/will evaluate the trustworthiness of root certs. There are pros and cons either way on that one. One la

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-18 Thread Peter Kurrasch
ember 17, 2015 6:26 PM To: mozilla-dev-security-pol...@lists.mozilla.org Subject: Re: Policy Update Proposal: Remove Code Signing Trust Bit Thanks to all of you for your thoughtful and constructive input in this discussion. Here is a summary of this discussion so far. Proposal: Remove refere

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-17 Thread Kathleen Wilson
Thanks to all of you for your thoughtful and constructive input in this discussion. Here is a summary of this discussion so far. Proposal: Remove references to code signing from Mozilla's CA Certificate Policy, then turn off all Code Signing trust bits for root certificates included in the NS

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-17 Thread Kathleen Wilson
On 9/16/15 8:53 PM, David E. Ross wrote: On 9/15/2015 8:51 AM, Kathleen Wilson wrote [in part]: Yes. My plan is to publish the DRAFT of version 2.3 of the policy and list the changes, and then send a CA Communication to be sure they are all aware of the proposed changes and give them time to re

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-16 Thread David E. Ross
On 9/15/2015 8:51 AM, Kathleen Wilson wrote [in part]: > Yes. My plan is to publish the DRAFT of version 2.3 of the policy and > list the changes, and then send a CA Communication to be sure they are > all aware of the proposed changes and give them time to respond. So, it > is very possible th

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-16 Thread Man Ho (Certizen)
On 9/17/2015 10:26 AM, Peter Kurrasch wrote: > As a counter exaple, consider that some in-car entertainment systems > offer (or want to offer) "downloadable app" capabilities. Obviously, Mozilla's position is that it should be the car manufacturer's responsibility to maintain their own trust lis

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-16 Thread Peter Kurrasch
‎It sounds as though the decision has been made, then: the code sign trust bit is out as are the pertinent certs. With Gerv giving a repeated "best regards" to the BR I don't think any other conclusion could be dr

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-15 Thread R Kent James
On 9/14/2015 9:47 AM, Kathleen Wilson wrote: Anyways, let's not discuss the Email trust bit in this particular discussion thread. I would like to keep this particular discussion focused on the policy proposal to remove the Code Signing trust bit. We will have a separate discussion about the Emai

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-15 Thread Kathleen Wilson
On 9/15/15 5:42 AM, Peter Kurrasch wrote: So is Mozilla becoming, in effect, just a browser company?‎ If email is de-prioritized and code signing is on life support, that would be good to know before getting too bogged down with issues that aren't necessarily important to Mozilla. I'm just try

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-15 Thread Peter Kurrasch
So is Mozilla becoming, in effect, just a browser company?‎ If email is de-prioritized and code signing is on life support, that would be good to know before getting too bogged down with issues that aren't necessarily important to Mozilla. I'm just trying to understand where the boundaries are.

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-14 Thread Kathleen Wilson
On 9/11/15 10:55 AM, Brian Smith wrote: The same argument applies to email. Nobody wants to admit that Thunderbird is dead, it is uncomfortable to know that the S/MIME handling in Thunderbird has been unmaintained for at least half a decade, and it's a little embarrassing to admit that the model

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-11 Thread Brian Smith
On Thu, Sep 10, 2015 at 1:20 PM, Kathleen Wilson wrote: > Proposal for version 2.3 of Mozilla's CA Certificate Policy: > > Remove the code signing trust bit. > > If this proposal is accepted, then there would be follow-up action items > that would need to happen after version 2.3 of the policy is

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-11 Thread Kurt Roeckx
On Thu, Sep 10, 2015 at 01:20:02PM -0700, Kathleen Wilson wrote: > Proposal for version 2.3 of Mozilla's CA Certificate Policy: > > Remove the code signing trust bit. > > If this proposal is accepted, then there would be follow-up action items > that would need to happen after version 2.3 of the

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-10 Thread Matt Palmer
On Fri, Sep 11, 2015 at 06:56:49AM +0300, Moudrick M. Dadashov wrote: > On 9/11/2015 3:23 AM, Peter Bowen wrote: > >On Thu, Sep 10, 2015 at 3:54 PM, Peter Kurrasch wrote: > >>It should be understood that code signing is very important in the > >>embedded space--just ask Tesla or Jeep/Chrysler or N

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-10 Thread Moudrick M. Dadashov
On 9/11/2015 3:23 AM, Peter Bowen wrote: On Thu, Sep 10, 2015 at 3:54 PM, Peter Kurrasch wrote: It seems to me that the benefits of this proposed change are minimal while the negative impacts to embedded systems ‎are significant. Perhaps I've missed something? It should be understood that cod

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-10 Thread Matt Palmer
On Thu, Sep 10, 2015 at 05:54:22PM -0500, Peter Kurrasch wrote: >It should be understood that code signing is very important in the >embedded space--just ask Tesla or Jeep/Chrysler or Nest or other IoT >product developers. If we accept that premise, the question immediately >becomes

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-10 Thread Peter Bowen
On Thu, Sep 10, 2015 at 3:54 PM, Peter Kurrasch wrote: > It seems to me that the benefits of this proposed change are minimal while > the negative impacts to embedded systems ‎are significant. Perhaps I've > missed something? > > It should be understood that code signing is very important in the

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-10 Thread Peter Kurrasch
It seems to me that the benefits of this proposed change are minimal while the negative impacts to embedded systems ‎are significant. Perhaps I've missed something? It should be understood that code signing is ver

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-10 Thread David E. Ross
On 9/10/2015 1:20 PM, Kathleen Wilson wrote [in part]: > Proposal for version 2.3 of Mozilla's CA Certificate Policy: > > Remove the code signing trust bit. > > If this proposal is accepted, then there would be follow-up action items > that would need to happen after version 2.3 of the policy is

Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-10 Thread Kathleen Wilson
Proposal for version 2.3 of Mozilla's CA Certificate Policy: Remove the code signing trust bit. If this proposal is accepted, then there would be follow-up action items that would need to happen after version 2.3 of the policy is published: 1) Remove any root certificates that do not have the W