On 8/27/14, 7:11 AM, Jean-Marc Desperrier wrote:
David E. Ross a écrit :
With a redacted audit report, the presumption
should be that hidden negative information exists that would disqualify
the certification authority from having its root certificate in the NSS
database if such information were disclosed.

any redaction would imply the existence of hidden negative
information that would necessitate removal of the affected root
certificate from the NSS database if such information were disclosed.

I think there's miscomprehension here.

I understand that the CAs are OK with people knowing that some unknown
serial numbers would give status “good”, but not with them knowing the
exact values of the concerned serial numbers, which could be used to
attack the system. Likewise with the 1024-bit certs with validity beyond
2013, it's useful to know they existed but a different matter to get the
name of the client (in that case, Mozilla could published the number of
certificates concerned).
Or letting people know which accounts exactly didn't have  multi-factor
authentication for certificate issuance.

I understand the redaction not to be about which kind of problem there
was, but about letting specific nominative information be published
about each problem.


Yes. That is a good explanation of the issue.

So, I thought I would float the idea and see what happens, or see if others had ideas about this.

Based on the discussion so far, I think the answer is that the CAs need to work with their auditors to create a public-facing audit statement that does not have information in it that the CA considers sensitive, but that sufficiently lists the BRs that the CA is still working to conform with.

Thanks,
Kathleen

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to