FYI at least one person is being blocked from posting to the list properly
for reasons unknown.

On Fri, Feb 10, 2023 at 11:04 AM Steve Keller <kellerst...@proton.me> wrote:

> Unfortunately it won't let me post. I don't see why it would be harmful to
> ask the community to double-check my work to make sure that I'm not
> misunderstanding the new requirements?
> As far as I can tell, there's a number of CAs currently rooted that are
> already engaging in Concerning Behavior, but maybe I'm misunderstanding
> something or Mozilla doesn't like that question?
>
> ------- Original Message -------
> On Tuesday, February 7th, 2023 at 9:52 PM, Steve Keller <
> kellerst...@proton.me> wrote:
>
> My apologies, for some reason its not posting my response. I will try
> again.
>
> Thanks,
> Steve
>
> ------- Original Message -------
> On Tuesday, February 7th, 2023 at 9:06 PM, Kurt Seifried <
> k...@seifried.org> wrote:
>
> You need to reply to the list.
>
>
> -Kurt
>
>
>
>
>
> On Feb 7, 2023, at 1:35 PM, Steve Keller <kellerst...@proton.me> wrote:
>
> 
> What happens to the CAs engaging in "Concerning Behavior" that *currently*
> have their root certificates in Mozilla's root store?
>
> Mozilla states:
> >  If the CA operator currently has root certificates in Mozilla's root
> store, then Mozilla *may* remove those root certificates or set them to
> be distrusted after a specified date.
>
> How much Concerning Behavior would a CA need to engage in before their
> root certificates were removed?
>
> Just a quick review of all the currently included CAs in Mozilla's root
> store and it seems that these CAs are already engaging in Concerning
> Behavior according to the recently announced considerations:
>
> 1. Agence Nationale de Certification Electronique - Corruption Perceptions
> Index Score less than 50 (score = 40)
> 2. certSIGN - Corruption Perceptions Index Score less than 50 (score = 46)
> 3. China Financial Certification Authority (CFCA) - Internet Freedom Score
> less than 50 (score = 10), Corruption Perceptions Index Score less than 50
> (score = 45)
> 4. E-Tugra - Internet Freedom Score less than 50 (score = 32), Corruption
> Perceptions Index Score less than 50 (score = 36)
> 5. eMudhra Technologies Limited - Corruption Perceptions Index Score less
> than 50 (score = 40)
> 6. Global Digital Cybersecurity Authority Co., Ltd. (Formerly Guang Dong
> Certificate Authority (GDCA)) - Internet Freedom Score less than 50 (score
> = 10), Corruption Perceptions Index Score less than 50 (score = 45)
> 7. Government of Hong Kong (SAR), Hongkong Post, Certizen aka "Hongkong
> Post" - Internet Freedom Score less than 50, Corruption Perceptions Index
> Score less than 50
> 8. Government of Turkey, Kamu Sertifikasyon Merkezi (Kamu SM) aka
> "TUBITAK" - Internet Freedom Score less than 50 (score = 10), Corruption
> Perceptions Index Score less than 50 (score = 45), CA's auditor has not
> audited other CAs whose root certificates are already included in Mozilla’s
> Root store
> 9. iTrusChina Co., Ltd. - Internet Freedom Score less than 50 (score =
> 10), Corruption Perceptions Index Score less than 50 (score = 45)
> 10. Microsec Ltd. - Corruption Perceptions Index Score less than 50 (score
> = 42), CA's auditor has not audited other CAs whose root certificates are
> already included in Mozilla’s Root store
> 11. Netlock - Corruption Perceptions Index Score less than 50 (score =
> 42), CA's auditor has not audited other CAs whose root certificates are
> already included in Mozilla’s Root store
> 12. Shanghai Electronic Certification Authority Co., Ltd. aka "UniTrust" -
> Internet Freedom Score less than 50 (score = 10), Corruption Perceptions
> Index Score less than 50 (score = 45)
> 13. Actalis - CA's auditor has not audited other CAs whose root
> certificates are already included in Mozilla’s Root store
> 14. Atos Trustcenter - CA's auditor has not audited other CAs whose root
> certificates are already included in Mozilla’s Root store
> 15. Buypass - CA's auditor has not audited other CAs whose root
> certificates are already included in Mozilla’s Root store
> 16. Chunghwa Telecom - CA's auditor has not audited other CAs whose root
> certificates are already included in Mozilla’s Root store
> 17. Disig, a.s. - CA's auditor has not audited other CAs whose root
> certificates are already included in Mozilla’s Root store
> 18. e-commerce monitoring GmbH - CA's auditor has not audited other CAs
> whose root certificates are already included in Mozilla’s Root store
> 19. HARICA - CA's auditor has not audited other CAs whose root
> certificates are already included in Mozilla’s Root store
> 20. SwissSign AG - CA's auditor has not audited other CAs whose root
> certificates are already included in Mozilla’s Root store
>
>
>
> ------- Original Message -------
>
> On Feb 1, 2023, at 1:59 PM, 'Kurt Seifried' via
> dev-security-policy@mozilla.org <dev-security-policy@mozilla.org> wrote:
>
> Correct me if I'm wrong but AFAIK all the main participants that consume
> what the CCADB creates are all US based
> (Mozilla/Microsoft/Google/Apple/Oracle/Adobe).
>
> Also if you really want "neutrality" then you'll need to define what you
> mean exactly. And probably include include Africa, Asia and South America
> at a minimum. I don't think this makes any sense.
>
> On Wed, Feb 1, 2023 at 11:12 AM John Han (hanyuwei70) <
> hanyuwe...@gmail.com> wrote:
>
> I understand that. Perhaps we could use "with a US-based or EU-based
> company." to address neutrality or it is impossible in legal?
>
> 在2023年2月2日星期四 UTC+8 01:18:15<ku...@seifried.org> 写道:
>
> On Wed, Feb 1, 2023 at 9:42 AM John Han (hanyuwei70) <hanyu...@gmail.com>
> wrote:
>
> > The CA operator is in a global region that cannot use the CCADB
> <https://www.google.com/url?q=https://trust.salesforce.com/blocked&source=gmail-imap&ust=1676406952000000&usg=AOvVaw1Zsjs0ZnCacCP-FlQO_3V3>,
> or is not capable of entering into a contractual agreement with a US-based
> <https://www.google.com/url?q=https://www.treasury.gov/resource-center/sanctions/Programs/Pages/Programs.aspx&source=gmail-imap&ust=1676406952000000&usg=AOvVaw24GMFsFHPQHRIHh-DgetqN>
>  company.
> Is this means US government can control whether any CA  is in Mozilla root
> store?
>
>
> I would assume if they are listed on
> https://sanctionssearch.ofac.treas.gov/
> <https://www.google.com/url?q=https://sanctionssearch.ofac.treas.gov/&source=gmail-imap&ust=1676406952000000&usg=AOvVaw0Cn3X8mTYKVH33ES8ZXuO4>
>  for example then yes, Mozilla and friends can't be doing business with
> them (and putting them into the root CA ... yow). I'm trying to think of a
> legitimate corner case where a company can't do business with a US entity
> legally but is still somehow trustworthy enough to be a root CA, and
> nothing comes to mind.
>
> --
> Kurt Seifried (He/Him)
> ku...@seifried.org
>
>
>
> --
> Kurt Seifried (He/Him)
> ku...@seifried.org <k...@seifried.org>
>
> --
>
>
>
>
>

-- 
Kurt Seifried (He/Him)
k...@seifried.org

-- 
You received this message because you are subscribed to the Google Groups 
"dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-security-policy+unsubscr...@mozilla.org.
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CABqVa38iOcFt5jZxOR2hBdOBRU-nwqhyD6ea6B0D%2B3trPk%2BVAw%40mail.gmail.com.
      • Re: DR... 'Kurt Seifried' via dev-security-policy@mozilla.org
        • RE... Roman Fischer
          • ... Kathleen Wilson
            • ... Kathleen Wilson
              • ... Matthew Hardeman
              • ... 'Jeremy Rowley' via dev-security-policy@mozilla.org
              • ... Ryan Hurst
              • ... Peter Bowen
              • ... 'Moudrick M. Dadashov' via dev-security-policy@mozilla.org
            • ... 'Kurt Seifried' via dev-security-policy@mozilla.org
  • Re: DRAFT: Root... 'Kurt Seifried' via dev-security-policy@mozilla.org
    • Re: DRAFT:... Kathleen Wilson
      • RE: DR... Roman Fischer
        • Re... Kathleen Wilson
          • ... Kathleen Wilson
            • ... Ryan Hurst
              • ... 'Jeremy Rowley' via dev-security-policy@mozilla.org
              • ... Ryan Hurst
              • ... 'Jeremy Rowley' via dev-security-policy@mozilla.org
              • ... 'Kurt Seifried' via dev-security-policy@mozilla.org
              • ... 'Kurt Seifried' via dev-security-policy@mozilla.org

Reply via email to