Gentoo Archives: gentoo-dev

From: Rich Freeman <rich0@g.o>
To: gentoo-dev <gentoo-dev@l.g.o>
Subject: Re: [gentoo-dev] Gentoo and Root CAs
Date: Tue, 01 Jan 2013 12:49:50
Message-Id: CAGfcS_=aeXoQjRt72T9dJGAywYiGhtkmb8TwMftEVBU1=Dr2vA@mail.gmail.com
In Reply to: Re: [gentoo-dev] Gentoo and Root CAs by Dirkjan Ochtman
1 On Tue, Jan 1, 2013 at 5:51 AM, Dirkjan Ochtman <djc@g.o> wrote:
2 > On Tue, Jan 1, 2013 at 1:44 AM, Rich Freeman <rich0@g.o> wrote:
3 >> The certificates that Gentoo distributes have at least been vouched
4 >> for by somebody who is a part of our community, which is more than can
5 >> be said for most of the upstream certificates.
6 >
7 > And you think "vouched for" by some community member is better than
8 > Mozilla's audit process, however limiting it may be?
9
10 Yes. It certainly is no worse. To date I'm not aware of a single
11 security incident involving a certificate introduced by a Gentoo
12 maintainer, but I'm certainly aware of a few involving
13 Mozilla-originated certs.
14
15 > (b) actual security of a CA probably goes down
16 > exponentially as you move towards CA's with a lower level of trust
17 > placed in them by organizations like Mozilla.
18
19 Care to substantiate that claim? The fact that Mozilla trusts a
20 certificate does not confer security in and of itself.
21
22 > IMO it would probably be good to limit our CA roots to Mozilla's
23 > libnss selection by default and perhaps add a packaged selection of
24 > secondary CA's (like CACert) for those who are so inclined. And if
25 > Debian's process is somewhat broken, it might be best to try not to
26 > rely on them. It can't be too hard, if Mozilla is already packaging
27 > the certificates somehow.
28
29 I've yet to see any evidence that Debian's process is broken. There
30 is simply the claim that Mozilla's process is somehow better.
31
32 I could see the logic in requiring regular Gentoo audits for any
33 certificates we bundle, in which case we likely wouldn't be bundling
34 any certificates at all (and would be stripping any provided by
35 upstream). However, the only thing following the Mozilla process
36 ensures is that a few commercial entities make lots of money (even if
37 Mozilla isn't one of them). For a company with deep pockets like
38 Mozilla I can see why they do this - even if it provides no security
39 they can just say they're doing what everybody else is doing and it
40 will likely hold up in court. The appearance of security matters more
41 than actual security to them.
42
43 Rich