Hi all,

I thought it prudent in light of the recent response from Symantec regarding 
the Google Chrome proposal for remediation to raise the question of the 
possible remedies the community and the root programs have against a CA 
behaving badly (mis-issuances, etc.)

Symantec makes a number of credible points in their responses.  It's hard to 
refute that the time frames required to stand up a third party managed CA 
environment at the scale that can handle Symantec's traffic could happen in 
reasonable time.

In the end, it seems inevitable that everyone will agree that practical time 
frame to accomplish the plan laid out could take... maybe even a year.

As soon as everyone buys into that, Symantec will no doubt come with the "Hmm.. 
By that time, we'll have the new roots in the browser stores, so how about we 
skip the third party and go straight to that?"

Even if that's not the way it goes, this Symantec case is certainly a good 
example of cures (mistrust) being as bad as the disease (negligence, bad 
acting).

Has there ever been an effort by the root programs to directly assess monetary 
penalties to the CAs -- never for inclusion -- but rather as part of a 
remediation program?

Obviously there would be limits and caveats.  A shady commercial CA propped up 
by a clandestine government program such that the CA seems eager to pay out for 
gross misissuance -- even in amounts that exceed their anticipated revenue -- 
could not be allowed.

I am curious however to know whether anyone has done any analysis on the 
introduction of economic sanctions in order to remain trusted -- combined with 
proper remediation -- as a mechanism for incentivizing compliance with the 
rules?

Particularly in smaller organizations, it may be less necessary.  In larger 
(and especially publicly traded) companies, significant economic sanctions can 
get the attention and involvement of the highest levels of management in a way 
that few other things can.

Thanks,

Matt
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to