Hi all,

 

The https://wiki.mozilla.org/CA:NameConstraints discussion is all about SSL.   
My post earlier on in this thread was to ensure we cover SSL and S/MIME 
differently due to the reality of the different threat models.

 

I agree that adding a ccTLD to a DNSNames.NameConstraints.permittedSubtrees  
(If that’s the most suitable way to refer to it) does not have the same effect 
as adding a ccTLD to a RFC822Name.NameConstraints.permittedSubtrees.  The later 
provides a useful belt and braces option to strengthen business/technical 
measure for prevention of issuance to alternative non ccTLD SMIME e-mail 
domains and therefore has some merit to be acceptable as a way to limit the 
scope of the issuing CA (Along with EKUs).  Noting that approval of the 
relevant ccTLD should be obtained too.  It’s not acceptable to include if 
permission is not gained…or does it, as not including at all denotes implicit 
permission of all ccTLDs.   

 

Thanks.

 

Steve

 

 

From: dev-security-policy 
[mailto:dev-security-policy-bounces+steve.roylance=globalsign....@lists.mozilla.org]
 On Behalf Of Adriano Santoni
Sent: 12 November 2015 07:29
To: [email protected]
Subject: Re: Clarify that a ccTLD is not acceptable in permittedSubtrees

 

That's a somewhat paradoxical scenario, but I suppose it's not altogether 
impossible.
It is yet another reason why ccTLDs should not be allowed (IMO) in 
NameConstraints.permittedSubtrees of a SubCA certificate.

But of course, prohibiting ccTLDs in NameConstraints would not be sufficient, 
in itself, to prevent a wildcard certificate for (say) *.us from being issued, 
as it could be issued by a non-technically constrained CA (it does not seem 
realistic to me, but many weird things happen in this world every day). 

So that's a different issue, IMO. If a wildcard certificate for a ccTLDs should 
never be issued by a trusted CA, regardless of such CA being "technically 
constrained" or not, then I suppose it should be expressly forbidden in BRs and 
in browser vendors' Root CA programs/policies.

But again, this is a different (although related) issue than I raised.

Adriano



Il 11/11/2015 21:38, Eric Mill ha scritto:

Regardless of whether technically allowed by the BRs -- a technically
constrained subordinate CA that is not (directly) audited that is allowed
to issue a valid *.us certificate would, if actually discovered in the
wild, create some shockwaves.
 
Really, any *.us certificate would create shockwaves, even if the
administrator of the .us ccTLD was the owner of a publicly trusted CA and
issued it using their normal processes.
 
Before ICANN opened the door to gTLDs like .google, was there any TLD for
which it would have been within the bounds of the internet's "social
contract" to issue a wildcard certificate?
 
-- Eric
 
On Wed, Nov 11, 2015 at 1:35 PM, Steve Roylance <
[email protected] <mailto:[email protected]> > wrote:
 

Hi Kathleen.
 
Apologies, as I should have sent my previous request concerning
hypothetical S/MIME ccTLD usage in response to this post.
My main concern was not to cover S/MIME and SSL Server Certificates with a
single rule.
 
I hope that came across clearly.
 
Thanks.
 
Steve
 
Sent from my iPhone
 

On 10 Nov 2015, at 20:08, Kathleen Wilson  <mailto:[email protected]> 
<[email protected]> wrote:
 
All,
 
I have been asked to consider updating Mozilla's CA Certificate Policy

to clarify that a ccTLD is not acceptable in permittedSubtrees for
technically constraining subordinate CA certs.

 
In section 7.1.5 of version 1.3 of the Baseline Requirement it says:
"(a) For each dNSName in permittedSubtrees, the CA MUST confirm that the

Applicant has registered the dNSName or has been authorized by the domain
registrant to act on the registrant's behalf in line with the verification
practices of section 3.2.2.4."

 
And in

https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/inclusion/

section 9 says: "For each dNSName in permittedSubtrees, the issuing CA

MUST confirm that the subordinate CA has registered the dNSName or has been
authorized by the domain registrant to act on the registrant’s behalf. Each
dNSName in permittedSubtrees must be a registered domain (with zero or more
subdomains) according to the Public Suffix List algorithm."

 
I don't see how a CA could confirm that the subordinate owns/controls

all of the domains for a ccTLD (e.g. *.uk). So, it seems to me that any
subordinate CA that has a ccTLD in permittedSubtrees does not meet the BR
or Mozilla requirements regarding being technically constrained.

 
So, should we specifically state (in the requirements regarding a subCA

being technically constrained) that permittedSubtrees cannot contain a
ccTLD?

 
Kathleen
_______________________________________________
dev-security-policy mailing list
[email protected] 
<mailto:[email protected]> 
https://lists.mozilla.org/listinfo/dev-security-policy

_______________________________________________
dev-security-policy mailing list
[email protected] 
<mailto:[email protected]> 
https://lists.mozilla.org/listinfo/dev-security-policy
 

 
 
 

 

-- 
Adriano Santoni 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to