Missing policy for CA certificates
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
ca-certificates (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: ca-certificates
The ca-certificates package doesn't have a proper security policy. The process of adding certificates to the list of trusted root CAs doesn't require any sort of objective attestation of the trustability of the CA, as witnessed by the inconsistent certificate list with some 3rd party audited CAs missing and some unaudited CAs available. Quoting the README.Debian:
- submit *GPG signed* bug report to ca-certificate with severity normal.
the bug report should include
- description of the CA
- how to obtain CA cert pem or paste it in the bug report
- license of the CA certificate
- fingerprint and/or hash value of the cert
- get 2 or 3 recommendation ("seconded" mail) from other people to
the bug report, GPG signed.
As the PKI security systems that the Internet rests on ultimately break down to how trustable the CAs are, this very seriously undermines any pretense of secure communications.
Perhaps the mozilla ca certificate policy, reviewed and developed by the Mozilla community for over a year, would be a good starting point for Ubuntu:
http:// www.mozilla. org/projects/ security/ certs/policy/