On Thursday, April 10, 2014 10:10:58 AM UTC+1, Kaspar Janßen wrote:
> On 10/04/14 10:08, Peter Eckersley wrote:
> 
> > Kaspar, suppose that Mozilla followed your suggestion and removed
> 
> > StartCom's root certificates from its trust store (or revoked them!). What
> 
> > would the consequences of that decision be, for the large number of domains
> 
> > that rely on StartCom certs?
> 
> I hope that an appropriate policy will force authorities to reconsider
> 
> their revocation principle. I don't want to harm someone nor I want to
> 
> work off in any way.
> 
> 
> 
> The key is that anybody should be able to shout out "don't trust me
> 
> anymore!" without a fee. Isn't that part of the trustchain idea?
> 
> 

The actual policy of the CA might annoy me, and I might think it's wrong, but 
that in and of itself is not a reason to remove trust. I did have them in my 
trust store up until now, despite having recommended against them for some time 
due to their policy, which I consider a bait-and-switch. In other words, I 
trusted their cryptography, but disliked their business model. Many of my 
contacts in the XMPP world used their free certificate offering to secure their 
servers.

However, I have removed them from my trust stores at this time because of the 
number of cases I'm personally aware of where potentially compromised 
end-entity certificates have not been revoked due to an inability or 
unwillingness to pay. This does absolutely cause problems; in fact there's a 
clear argument that it's lowering security by removing my ability to 
authenticate the certificates of other XMPP servers. However, it's also 
removing the risk of authenticating a compromised certificate as genuine due to 
lack of revocation.

To put it more simply, the certificate authority has a very high volume of 
untrustworthy certificates in circulation.

At this point, I can no longer generally trust certificates signed by the CA, 
and I would recommend others do not trust the CA either. This is an unusual 
situation, and I'd expect cases such as this to be both rare and to require 
decisions on a case-by-case basis.

> 
> I read a few times that Chrome doesn't even check if a certificate is
> 
> revoked or not (at least not the default settings). That leads me to the
> 
> question: Is it mandatory for a CA in mozilla's truststore to have to
> 
> ability to revoke a certificate or is is only an optional feature
> 
> provided by some CAs?

StartCom can revoke certificates, and are willing to do so for a fee. This is 
not a question of technical ability.

Any CA, to function as a legitimate and trustworthy authority, ought to be able 
to revoke a certificate, and provide revocation information as published in 
their certificates according to the relevant standards. StartCom do pass this 
bar.

As to whether or not Chrom[ium] checks revocations, it's possible to set it to 
do so (and therefore be secure), and insecurity of some client applications is 
obviously no excuse for a CA to be insecure, but this is really a moot point in 
this case.

Dave.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to