On Mon, October 20, 2014 7:17 am, Anne van Kesteren wrote:
> On Mon, Oct 20, 2014 at 3:41 PM, Gervase Markham <
ge...@mozilla.org> wrote:
> > Perhaps we just need to jump that gap and accept what is /de facto/
> > true.
>
> Yeah, as with
publicsuffix.org we should own this up.
>
I would, in fact, argue strongly against this, despite recognizing the
value that the open root program has.
The decisions made for the root program are directly tied to the
capabilities and behaviours of the Mozilla software package it's
distributed with - in particular, Firefox. The behaviours, limitations,
bugs, and features of Firefox/NSS (e.g. including both NSS and
mozilla::pkix) play very heavily into the discussion and maintenance of
the root program.
Consider the 1024-bit root removals. For NSS and mozilla::pkix using
applications, a known set of tradeoffs were made to minimize any backwards
compatibility issues. However, a large number of programs with sub-optimal
to non-existent chain building and discovery algorithms (read: OpenSSL)
experienced issue, because the software was too dumb to discover paths to
the 2048-bit roots.
Accepting the Root Program as a product for "general" PKI purposes
inherently means such flawed behaviours are in scope and "supported",
equivalent to public API surfaces. Having to weigh such considerations
when making decisions about how best to secure the public Internet, and
Firefox users at large, is not a desirable point to be.
I have seen plenty of bungled attempts at repackaging the Mozilla list,
and I have zero faith that having an 'official' supported way would in any
way reduce the bungling. In many cases, the bungling is done by
well-intentioned people with ideological axes to grind, rather than people
who understand the issues at play. Adding roots that have never been
audited, re-adding removed roots that haven't been audited for years,
botching the trust records, etc.
Consider this (long) email an encouragement to "caveat repackager", and
say that it's only supported when used with the Mozilla product it's
packaged with - NSS and Firefox. Maintaining a trust store for multiple
PKI products, with differences in behaviour, nuance, and bugs, is not a
scalable operation.