On Thursday, August 16, 2018 at 6:18:47 PM UTC-5, Jakob Bohm wrote:

> The main cause of this seems to be that CT has allowed much more
> vigorous prosecution of even the smallest mistake.  Your argument
> is a sensationalist attack on an thoroughly honest industry.

I certainly didn't mean it as an attack.  I do agree that CT has allowed for 
greater scrutiny and in turn we find more issues.  Some of those issues are 
insignificant, some are of concern.  I did not mean to in any way imply that 
there is currently a controversy involving malfeasance at a CA.

In fact, my proposal stemmed in equal part from the concern that today's domain 
validation methods are susceptible to problems in network service layers which 
are known to be insecure and where vulnerabilities have been demonstrated.

> That is a viewpoint promoted almost exclusively by a company that has
> way too much power and is the subject of some serious public
> prosecution.  Cow-towing to that mastodont is not buy-in or agreement,
> merely fear.

In this particular aspect, I suspect you and I substantially agree.  I don't 
hold any strong opinion against that particular company, but they certainly can 
bring much weight to any argument they make.  I do see both sides of the 
argument.  I'm on the record in several other threads in this group advocating 
for the value of strong identity in WebPKI certificates and advocating for 
continued inclusion of this information.  My overall position on that has not 
changed and to reiterate clearly, one again, I'm definitely on the other side 
of that argument versus that certain large company.

Having said that, IF and only IF consensus arrived in the other direction -- 
that the only meaningful subject identifiers in WebPKI certificates are the 
covered domain labels -- then I would assert that it makes sense to pursue a 
WebPKI in which the existing authority hierarchy be directly responsible for 
certificates within that hierarchy and in a manner constrained directly to the 
limits of each Registry's authority over the DNS.  This, I believe, would be 
preferable to a multi-party system in which the best practices, at best, 
determine issuing authority on the basis of insecure proxies and consequences 
of the authoritative data.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to