On Thursday, 17 November 2016 19:28:54 UTC, Brian Smith  wrote:
> Let's say I screw up something and accidentally issue a certificate from my
> sub-CA for google.com or addons.mozilla.org. Because of the name
> constraints, this is a non-issue and shouldn't result in any sanctions on
> the original root CA or Example Corp.

Signifies incompetence. This CA as operated is untrustworthy due to 
incompetence, root CA should decide whether corrective action by Example Corp 
is possible and appropriate or revoke the sub-CA. Trust stores should oversee 
CA investigation and if inadequate, consider sanctions.

> Let's say I issue a SHA-1-signed certificate for
> credit-card-readers.example.com. Again, that's 100% OK, if unfortunate,
> because after 2017-1-1 one shouldn't be using Mozilla's trust store in a
> web browser or similar consumer product if they accept SHA-1-signed
> certificates.

Once again, incompetence.

There's a recurring pattern in most of the examples. A technical 
counter-measure would be possible, therefore you suppose it's OK to screw-up 
and the counter-measure saves us. I believe this is the wrong attitude. These 
counter-measures are defence in depth. We need this defence because people will 
screw up, but that doesn't make screwing up OK.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to