> -----Original Message-----
> From: [email protected] [mailto:therightkey-
> [email protected]] On Behalf Of Ben Laurie
> Sent: Wednesday, October 24, 2012 4:29 AM
> To: Phillip Hallam-Baker
> Cc: [email protected]; Paul Hoffman
> Subject: Re: [therightkey] Impact on issue processes
> 
> On 24 October 2012 12:16, Phillip Hallam-Baker <[email protected]>
> wrote:
> >
> >
> > On Wed, Oct 24, 2012 at 6:18 AM, Ben Laurie <[email protected]> wrote:
> >>
> >> On 24 October 2012 03:02, Paul Hoffman <[email protected]>
> wrote:
> >> > [[ I changed the subject line because this should be discussed on
> the
> >> > list *before* the meeting. It is not a separate agenda item, yet.
> ]]
> >> >
> >> > On Oct 23, 2012, at 6:41 PM, Phillip Hallam-Baker
> <[email protected]>
> >> > wrote:
> >> >
> >> >> One of the key issues as far as acceptability to CAs is concerned
> is
> >> >> impact on issue processes. In particular it has to be possible to
> deploy any
> >> >> experimental infrastructure without touching the certificate
> issue code.
> >>
> >> What? Why? Are you saying CAs can't test modified issuance code?
> >
> >
> > Proposing to change that code is like you proposing to change the
> Google
> > search algorithm to make CT work. Just not going to happen.
> 
> That is not what I've heard from others.
>
> > That is an audited system. It has a very complex and elaborate QA. It
> > extends across the resellers that take the orders and the CA issue
> center.
> >
> > If CT had been proposed twenty years ago it might be viable to put
> the proof
> > in the cert. Any change now has to work around the existing
> infrastructure.
> 
> If your infrastructure can't cope, fine, put it in OCSP, or in a TLS
> extension. I don't believe all CAs are unable to modify their
> software.

It's not a question of being unable to modify our software. As a representative 
of Symantec, I will tell you that modifying our issuance code will be a very 
tough sell, for a number of reasons:
 - There's no obvious direct return on investment
 - For some types of certificates, speed of issuance is very important. Getting 
a CT proof will slow this down and cause it to fail if the log server isn't up 
100% of the time.
 - It makes sense to avoid relying on external parties to fulfill part of our 
cert issuance process. At this point, it's unclear who would even host a log 
service, what SLA they would provide, how much attention they would pay to 
performance and availability, disaster recovery, etc.
 - Symantec would not be interested in hosting a log service because of unclear 
ROI.

-Rick
_______________________________________________
therightkey mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to