Kathleen -

In looking at this Draft CA Communications, I looked at the description of 
Behavior change and #5 doesn't look like the change is the right interpretation:

5. If the inhibitAnyPolicy extension is present in an intermediate certificate 
or trust anchor and children certificates have a certificate policy extension 
the verification will fail. bug 989051

According to RFC 5280:
The inhibit anyPolicy extension can be used in certificates issued to CAs. The 
inhibit anyPolicy extension indicates that the special anyPolicy OID, with the 
value { 2 5 29 32 0 }, is not considered an explicit match for other 
certificate policies except when it appears in an intermediate self-issued CA 
certificate. The value indicates the number of additional non-self-issued 
certificates that may appear in the path before anyPolicy is no longer 
permitted. For example, a value of one indicates that anyPolicy may be 
processed in certificates issued by the subject of this certificate, but not in 
additional certificates in the path.



The inhibitAnyPolicy extension does not mean that a certificate Policy 
extension can't be in the end entity certificate or any intermediate 
certificates in the chain, it means that the "anyPolicy OID" is not valid 
further down in the certificate path.  It would be used when you want to ensure 
a specific certificate policy is in the path all the way to the end-entity 
certificate.



Thanks,

   Wendy

Wendy Brown
FPKIMA Technical Liaison
Protiviti Government Services
703-299-4705 (office)    703-965-2990 (cell)

[email protected]
[email protected]




Date: Mon, 28 Apr 2014 12:04:15 -0700

From: Kathleen Wilson <[email protected]<mailto:[email protected]>>

To: 
[email protected]<mailto:[email protected]>

Subject: DRAFT: May CA Communication

Message-ID: 
<[email protected]<mailto:[email protected]>>

Content-Type: text/plain; charset=windows-1252; format=flowed



All,



Here is a DRAFT CA Communication that I would like to send next week. I will 
greatly appreciate your thoughtful and constructive feedback on it.



Previous CA Communications: https://wiki.mozilla.org/CA:Communications



** DRAFT CA Communication **



Subject: Mozilla Communication: Action requested by <date>



Dear Certification Authority,



This note requests a set of actions on your behalf, as a participant in 
Mozilla's CA Certificate Program. Please reply by <date>, with your response to 
these action items. A compiled list of CA responses to the following action 
items will be published.



Mozilla's CA Certificate Inclusion Policy:

http://www.mozilla.org/about/governance/policies/security-group/certs/policy/inclusion/



Mozilla's spreadsheet of included root certificates:

http://www.mozilla.org/about/governance/policies/security-group/certs/included/



1) Ensure that Mozilla?s spreadsheet of included root certificates has the 
correct link to your most recent audit statement, and that the date of the 
audit statement is correct. As per Mozilla's CA Certificate Policy, we require 
that all CAs whose certificates are distributed with our software products 
provide us an updated statement annually of attestation of their conformance to 
the stated verification requirements and other operational criteria by a 
competent independent party or parties.



Please respond with one of the following:

A) Mozilla?s spreadsheet of included root certificates has the correct link to 
our most recent audit statement, and the audit statement date is correct.

B) Here is the most recent audit statement for our certificates that are 
included in Mozilla?s CA program: <insert link here>

C) We plan to send Mozilla our current audit statement by <insert date

here>.





2) Send Mozilla the link to your most recent Baseline Requirements audit 
statement. Details about Mozilla's audit requirements are listed in section 11 
of Mozilla's CA Certificate Inclusion Policy.



Please respond with one of the following:

A) Mozilla?s spreadsheet of included root certificates has the correct link to 
our most recent Baseline Requirements audit statement.

B) Here is the most recent Baseline Requirements audit statement for our 
certificates that are included in Mozilla?s CA program: <insert link here>

C) We plan to send Mozilla our current Baseline Requirements audit statement by 
<insert date here>.

D) The websites (SSL/TLS) trust bit is not enabled for our certificates that 
are included in Mozilla's CA program.





3) Test Mozilla's new Certificate Verification library with your CA hierarchies 
and inform your customers of the upcoming changes as needed.

The new Certificate Verification library (mozilla::pkix) was announced

here:

https://blog.mozilla.org/security/2014/04/24/exciting-updates-to-certificate-verification-in-gecko/



Mozilla::pkix includes some changes in support of current best practices and 
policies, as listed here:

https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Behavior_Changes



How to test:

https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Testing



Please respond with one of the following:

A)  We have tested certificates in our CA hierarchy with Mozilla's new 
Certificate Verification library, and found that the certificates in our CA 
hierarchies are not impacted by the changes introduced in mozilla::pkix.

B) We have found the following issues when testing certificates in our CA 
hierarchy with mozilla::pkix. <descriptions or Bugzilla bug numbers, related 
URLs and/or certificates>

C) We are testing certificates in our CA hierarchy with Mozilla's new 
Certificate Verification library, and plan to send Mozilla our results by 
<insert date here, must be before June 30, 2014>.





4) Check your certificate issuance to confirm that no new certificates will be 
issued with the problems listed here:

https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Things_for_CAs_to_Fix



Please respond with one of the following:

A) We have not and will not issue certificates with the problems listed in the 
mozpkix-testing#Things_for_CAs_to_Fix wiki page.

B) We have previously issued certificates with the following problems listed in 
the mozpkix-testing#Things_for_CAs_to_Fix wiki page: <list the problems that 
needed to be fixed>. The last of those certificates expire <insert dates here>. 
We will not issue new certificates with the problems listed in the 
mozpkix-testing#Things_for_CAs_to_Fix wiki page as of this date: <date when 
your operations will be updated, no later than June 30, 2014>





5) Send Mozilla information about your publicly disclosed intermediate 
certificates that chain up to certificates in Mozilla's CA program, as per 
Items #8, 9, and 10 of Mozilla's CA Certificate Inclusion Policy.



Please respond with one of the following:

A) All intermediate certificates chaining up to our certificates in Mozilla's 
CA program are either included in our annual audits and listed in our annual 
audit statements, or are technically constrained according to section 9 of 
Mozilla's CA Certificate Inclusion Policy.

B) The required information, according to section 10 of Mozilla's CA 
Certificate Inclusion Policy, is available here: <URL to a web page, or 
Bugzilla Bug Number>.





Participation in Mozilla's CA Certificate Program is at our sole discretion, 
and we will take whatever steps are necessary to keep our users safe. 
Nevertheless, we believe that the best approach to safeguard that security is 
to work with CAs as partners, to foster open and frank

  communication, and to be diligent in looking for ways to improve.

Thank you for your cooperation in this pursuit.



Regards,

Kathleen Wilson, Module Owner of Mozilla's CA Certificates Module



** END DRAFT **



NOTICE: Protiviti is a global consulting and internal audit firm composed of 
experts specializing in risk and advisory services. Protiviti is not licensed 
or registered as a public accounting firm and does not issue opinions on 
financial statements or offer attestation services. 

This electronic mail message is intended exclusively for the individual or 
entity to which it is addressed. This message, together with any attachment, 
may contain confidential and privileged information. Any views, opinions or 
conclusions expressed in this message are those of the individual sender and do 
not necessarily reflect the views of Protiviti Inc. or its affiliates. Any 
unauthorized review, use, printing, copying, retention, disclosure or 
distribution is strictly prohibited. If you have received this message in 
error, please immediately advise the sender by reply email message to the 
sender and delete all copies of this message. Thank you.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to