Hi Kathleen,

Sorry for not reacting to the original thread.  The wording if good, however
please note the bugs which we found recently.  Wording can be obeyed by
CA's, but it is not currently obeyed by Mozilla platforms(s) where the EKU
is
just id-kp-emailProtection.   id-kp-serverAuth can be added to remove the
bug, but of course that's dangerous.

Firefox bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=1226353 

Thunderbird bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=1225818 

Note that we didn't test other platforms.

Steve

> -----Original Message-----
> From: dev-security-policy [mailto:dev-security-policy-
> [email protected]] On Behalf Of
> Kathleen Wilson
> Sent: 18 November 2015 19:33
> To: [email protected]
> Subject: Re: Policy Update Proposal -- Refer to BRs for Name Constraints
> Requirement
> 
> On 11/5/15 11:00 AM, Kathleen Wilson wrote:
> > On 10/28/15 10:25 AM, Kathleen Wilson wrote:
> >
> >> Therefore, this proposal is modified to simplify item #9 of the
> >> Inclusion Policy,
> >> https://www.mozilla.org/en-US/about/governance/policies/security-grou
> >> p/certs/policy/inclusion/
> >>
> >>
> >> as follows:
> >> ~~
> >> We encourage CAs to technically constrain all subordinate CA
> >> certificates. For a certificate to be considered technically
> >> constrained, the certificate MUST include an Extended Key Usage (EKU)
> >> extension specifying all extended key usages that the subordinate CA
> >> is authorized to issue certificates for. The anyExtendedKeyUsage
> >> KeyPurposeId MUST NOT appear within this extension.
> >> - If the certificate includes the id-kp-serverAuth extended key
> >> usage, then the certificate must be Name Constrained as described in
> >> section
> >> 7.1.5 of version 1.3 or later of the CA/Browser Forum Baseline
> >> Requirements for the Issuance and Management of Publicly-Trusted
> >> Certificates.
> >> - If the certificate includes the id-kp-emailProtection extended key
> >> usage, then all end-entity certificates MUST only include e-mail
> >> addresses or mailboxes that the issuing CA has confirmed (via
> >> technical and/or business controls) that the subordinate CA is
authorized to
> use.
> >> ~~
> >>
> >
> >
> > Based on the lack of response to this revised proposal, I am going to
> > assume that everyone is OK with it.  Please let me know if you disagree.
> >
> > Thanks,
> > Kathleen
> >
> >
> 
> I've moved this proposal to the Approved section in the wiki page:
> https://wiki.mozilla.org/CA:CertificatePolicyV2.3#Approved
> 
> Thanks,
> Kathleen
> 
> 
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to