W3C home > Mailing lists > Public > public-test-infra@w3.org > October to December 2013

Re: Testing and certificates

From: Brad Hill <hillbrad@gmail.com>
Date: Tue, 15 Oct 2013 15:14:26 -0700
Message-ID: <CAEeYn8hH4xOSpfkMqTQxiDkoThZ8qyswzvf=x69XQeamWiQaEw@mail.gmail.com>
To: Robin Berjon <robin@w3.org>
Cc: Odin HÝrthe Omdal <odinho@opera.com>, public-test-infra <public-test-infra@w3.org>
CAs have a certificate policy statement that they are audited against and
to which they must conform.  It's not a simple matter to "grant an
exception" even if browsers were to allow it.  The entire system is set up
to not allow that kind of thing to happen, with good reason.  The CPS is
basically a contract they've agreed to with all of their customers and
other relying parties.

If browsers want to make a special accommodation, why not a way to pass in
a new (temporary) trust root from the command line?

-Brad
On Oct 15, 2013 12:14 PM, "Robin Berjon" <robin@w3.org> wrote:

> Hi Brad,
>
> thanks a lot for those details.
>
> On 15/10/2013 19:08 , Brad Hill wrote:
>
>> No default-trusted CA is going to be OK with issuing a certificate and
>> then having you pass the private key around, even for a non-public name.
>>   They will consider that a key compromise and revoke it. (they are
>> actually mandated to by the agreements they have with browsers)
>>
>
> Are there reasons *other* than their agreements with the browsers why they
> would have to revoke it? I ask because, well, we have browser vendors
> around here. It's a bit more overhead that I was hoping for in addressing
> this problem, but if that's the only issue, we could possibly negotiate an
> exemption.
>
>  1) built and distributed a VM image with browsers that have a custom CA
>> provisioned and certs issued off that CA installed on the server, to be
>> used for offline testing
>>
>
> I don't think that works for us, we need people to test with arbitrary
> browsers (or I'm missing something).
>
>  2) stood up an AWS image with a real domain name and certificate on it
>> (https://webappsec-test.info) and I give non-root shells to people who
>> ask, to do online testing
>>
>
> We are definitely also publishing the test suite online, and using a real
> cert there in the usual way. Our concern is about
>
>  GlobalSign will issue a wildcard certificate for free to open source
>> projects, which is what I did for #2 to save a few hundred $$, but they
>> for sure won't be OK with sharing the private key around.
>>
>
> Thanks, I'll check that out. That said this project, while open source, is
> also heavily supported by W3C so we might not qualify :)
>
> --
> Robin Berjon - http://berjon.com/ - @robinberjon
>
Received on Tuesday, 15 October 2013 22:14:55 UTC

This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 17:34:10 UTC