On Tue, Apr 03, 2018 at 05:19:32AM -0700, ramirommunoz--- via 
dev-security-policy wrote:
> Completely agree with you about that a new root by itself do not solve the 
> problem.

The phrase you're looking for is "necessary but not sufficient".  That is,
it is necessary to create new roots to restore trust, but not sufficient to
do so.  You also have to demonstrate a high degree of competence in running
a CA, and understanding and responding to legitimate concerns.

> The issue now is choosing the starting point.
> 
> 1.- New root 2018
> 
> 2.- 2016 root, after revoke all certificates (< 100 units) and pass an
> "Point in Time" BR compliant audit.  (Camerfirma proposal)

The problem with the 2016 roots is that there is no way to rehabilitate them
to the point that they will be as worthy of trust as new, fresh roots, for
several reasons.

Firstly, revocation is "fail open".  Not every relying party checks
revocation information, and when the checks are made but they fail, it is
*usually* OK to continue, so user agents do so.

Revocation is the ejection seat of PKI.  It's the option of last resort when
everything else has gone to hell, and you can only hope it does the job. 
You don't build a crappy fighter aircraft whose wings fall off periodically,
and then justify it by saying "oh, it's OK, it's got an ejection seat".  No,
you build the best 'plane you can, and you add the ejection seat as the
"well, it's *slightly* better than nothing" final option.  Because they hurt
to use.  A lot.  And for various reasons they don't always work quite right. 
But they give you a better chance of survival than a crash.

However, back to the point at hand: even if revocation were 100% reliable,
there's still the possibility of incomplete enumeration of certificates.  I
cannot think of a way you could possibly prove that there is zero chance of
there being undisclosed certificates chaining to the old roots.  New roots,
on the other hand, have that zero chance, because they're new, and have been
under effective audited control since day zero.  So, again, new roots would
be more trustworthy than the old roots.

- Matt

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to