On Fri, Jun 13, 2025 at 5:58 AM Tobias S. Josefowitz <[email protected]>
wrote:

> And in that scenario, I fail to see how transparently communicated
> commitments alongside the incentive structure of the CA to follow them
> would create a dynamic subject to your concern.
>
> Is the concern that "rich" CAs would voluntarily commit to additional
> limitations, only to then violate them as some part of a "weird flex"? If
> not that, what is it?


Right now there is nothing punitive about a CA’s responsibilities in the
face of CPS-related misissuance: the things required of them are strictly
remedial, being simply to correct the error they imposed on the WebPKI’s
collection of valid certs. They don’t even require revocation, if the CA
has chosen to structurally mitigate the risk of misissuance by issuing
Short-Lived certificates. There is nothing inflicting harm as an attempt to
balance the possible operational disincentive a poorly-organized CA might
have against performing appropriate remediation. Even the prospect of
distrust is remedial: if the CA can’t be trusted, they shouldn’t be trusted.

What you’re proposing is that we add something punitive, which means that,
I assume, you believe that we would need something to motivate action that
the CA might otherwise not take without the prospect of that punishment.
That motivational effect would not be equal across all CAs, which means
that the calculus of be-careful-or-pay would not be a reliable means to get
back to the important state: the WebPKI’s corpus of valid certificates
being trustable *in all their details* by relying parties. (I think that
the focus on there being some commercial element to issuance and trust
would not age well either, given that a large and quickly-growing portion
of the web’s certs are not issued on a commercial basis. Who would get
credits from Microsoft for their recent misissuance? Another part of
Microsoft?)

And—I’m sorry this is so long, but whatever—the proposed punitive measure
doesn’t even make the PKI whole! You would still have certs floating around
with incorrect information, but the subscriber would have a trivial credit
against their next webinar about automation.

If it is in the CA’s interest to provide additional voluntary constraints
on their issuance, then it is because it is somehow in their interest to do
so. That could be because they are chartered to improve the security of the
web (would that they all were, tbh), or to distinguish themselves in a
competitive marketplace. They should not pursue those things in ways that
undermine the fundamental guarantee of the WebPKI: the attributes of the
certificate are true. Either way, those constraints don’t matter unless
they can be relied on by RPs. And if they are to be relied on then they
need to hold for all valid certificates, so…

CAs can “maybe, we’ll try!” exceed BRs on their own initiative, without any
interaction with the BRs or its remedial mechanisms; just don’t put it in
the CPS. Maybe the CAB/F can give out ribbons for effort on the social
event cruise, or provide badges for CAs to put on their web sites and in
email signatures. “__321__ days since a commitment(*)-breaking issuance!”

But, again, I think this is a molehill and not a mountain. At best an
amusing distraction from pursuits that might actually *improve* the
reliability of the WebPKI, rather than make it even more complicated for
relying parties to navigate.

Mike

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CADQzZqvqrGfiFkK6f%3Dt6kD8VPwNpocBBdkYSNbOA3me12CG6UA%40mail.gmail.com.

Reply via email to