On Tue, Jan 1, 2013 at 1:44 AM, Rich Freeman <ri...@gentoo.org> wrote:
> The certificates that Gentoo distributes have at least been vouched
> for by somebody who is a part of our community, which is more than can
> be said for most of the upstream certificates.

And you think "vouched for" by some community member is better than
Mozilla's audit process, however limiting it may be?

Yes, the CA system is broken, but it's what we've got for now. It
seems obvious that including fewer CA roots in our base package is a
better solution than including more of them, since (a) it's pretty
easy for our users to install more of them, including at scale (via an
overlay), and (b) actual security of a CA probably goes down
exponentially as you move towards CA's with a lower level of trust
placed in them by organizations like Mozilla.

Speaking of which, say what you will about Mozilla's broken criteria
for root inclusion, but Mozilla has no commercial interests, pretty
competent security staff, and is already spending lots of staff time
at managing their selection of CA roots. So I think we could do worse
than tracking them closely (and in fact, I'd say we *are*, currently
doing just that -- doing worse).

IMO it would probably be good to limit our CA roots to Mozilla's
libnss selection by default and perhaps add a packaged selection of
secondary CA's (like CACert) for those who are so inclined. And if
Debian's process is somewhat broken, it might be best to try not to
rely on them. It can't be too hard, if Mozilla is already packaging
the certificates somehow.

Cheers,

Dirkjan

Reply via email to