Frank Hecker:
So let me make my own views clear on two points that you made on we ma
have some opposing views:
OK
First, with respect to the impact of turning off the Entrust email trust
bit, my concern is as follows: There may Entrust-controlled subordinates
under the Entrust root that issue email certificates, and also
non-Entrust CAs cross-signed by Entrust (like DigiNotar) that issue
email certificates.
Exactly.
Unlike DigiNotar, some of those subordinate CAs or
cross-signed CAs may actually comply with Mozilla CA policy with regard
to issuing email certificates.
Maybe, but who cares at this stage? I mean we have facts, that the trust
relationship between Mozilla and Entrust has been breached. And I'm not
blaming DigiNotar, since they never claimed to validate email addresses.
There is no way one can remove the responsibility away from the CA who's
root is in Mozilla! I think I don't have to explain that even...
If so, I'd like to look at the
possibility of adding their CA certificates as trust anchors, so that
their email certificates will continue to work, and so users of
Thunderbird and other Mozilla-based mail clients will not be unduly
impacted by any disabling of email trust at the Entrust root level.
This might be certainly welcome, however the time frame of finding those
and have them included isn't something I would make depend on a decision
for removing the email trust bit from the affected CA root certificate.
We are not in a guessing game here, we are implementing policies. We
must do our job according to the policy we've accepted.
(Besides, who cares about the subscriber anyway, it's the relying party
which matter here)
I especially interested in whether any of the CAs waiting in our request
queue have cross-signing arrangements with Entrust. If so, that may
affect the priority we assign to evaluating their requests. There may be
other CAs that are taking advantage of Entrust cross-signing to get
their certificates recognized in Firefox, Thunderbird, etc., but have
never submitted a request to us to include their roots.
We are certainly interested to know about it, however it's not our job
starting a search and rescue operation for CAs which might be under
Entrust's root and who might be affected. Besides that they themselves
might be not compliance with the policy to start with...
I am less
worried about these CAs, but it might be nice to at least be able to
tell them what we're doing and ask them to submit their own inclusion
requests.
Frank, I'm most worried about exactly those CAs. CAs which have applied
for inclusion such as DigiNotar have undergone a certain process and we
most importantly know about them. I'm worried a lot about what we don't
know!
Of course they can apply for inclusion once they realize that the email
trust bit is gone (not sure if they'd even realize, I don't have any
S/MIME certificates signed by Entrust so far in my "Other Peoples" tab).
Entrust can reapply to have that trust bit enabled again too.
Second, with regard to schedule: We are at a critical point in the
Firefox 3 schedule, with Firefox 3 RC1 coming up fast. Firefox 3 does
not use the email trust bit, so there is no need to tie any Entrust
email trust bit changes to the Firefox 3 schedule. Instead we should
look at the schedule for upcoming update releases of Thunderbird and
SeaMonkey, and determine what sort of timeframe we have for making a
change like this.
Frank, I'm using Thunderbird day-in, day-out. I rely on it. It's one of
my most important tools I've got. Nelson uses Seamonkey (AFAIK) and
relies on it. Two important users which rely on it daily! If you intend
to live up to the Mozilla policy then there are facts, which require
action in this or that way.
(Entrust can revoke the signed CA certificate if they prefer, otherwise
that trust bit must go away and a update published as soon as possible.
Do you remember that just a few days or weeks ago you explained to me
the update mechanism in case a CA must be removed/adjusted/have the EV
status changed? I'm worried that you will not live up to that, once such
a case happens.)
--
Regards
Signer: Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber: [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog: Join the Revolution! <http://blog.startcom.org>
Phone: +1.213.341.0390
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto