On Thu, May 23, 2024 at 12:42 PM David Benjamin <david...@chromium.org> wrote:
<snip>
>
> Of course, whether this property (whether servers can usefully pre-deploy 
> not-yet-added trust anchors), which trust expressions does not have, even 
> matters boils to whether a root program would misinterpret availability in 
> servers as a sign of CA trustworthiness, when those two are clearly unrelated 
> to each other. Ultimately, the trustworthiness of CAs is a subjective social 
> question: do we believe this CA has *and will continue* only sign true 
> things? We can build measures to retroactively catch issues like Certificate 
> Transparency, but the key question is fundamentally forward-looking. The role 
> of a root program is to make judgement calls on this question. A root program 
> that so misunderstands its role in this system that it conflates these two 
> isn't going to handle its other load-bearing responsibilities either.

As the old saw goes "past performance is no guarantee of future
results, but it sure helps". Moreover root programs have to balance
the benefits of including a CA against the costs. One of those
benefits is the number of sites that use it.

Sincerely,
Watson

>
> David
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org


--
Astra mortemque praestare gradatim

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to