On 5/6/14, 12:05 PM, Kathleen Wilson wrote:
On 5/2/14, 1:36 PM, Peter Bowen wrote:
I don't think the policy allows for "c" (in regards to SSL certs). I
hope
that eventually all of the non-technically constrained intermediate
certs
will be part of some sort of database of allowed (known and audited)
intermediates. Then SSL certificate path validation would fail if the
chain
contained an intermediate cert that was not technically constrained
and was
not in the database.

There's still plenty of work to do before this will be viable.

Perhaps you're noticing an issue with the text in the CA Communication?

You had proposed adding a C) for CAs who say they need more time for
some subordinate CAs.  I'm proposing that they should be required
explicitly choose A, B, or C for each CA certificate in the heirarchy
and to disclose some data about the C certs if Mozilla is going to
allow them more time, so there is visibility into how many CA certs
are out there that are not compliant with the policy.


How about the following:


https://wiki.mozilla.org/CA:Communications#DRAFT_for_May.2C_2014

Tweaked it some more...
--
5) Send Mozilla information about your publicly disclosed intermediate certificates that chain up to certificates in Mozilla's CA program, as per Items #8, 9, and 10 of Mozilla's CA Certificate Inclusion Policy.

Please provide a URL to a web page or a Bugzilla Bug Number that lists all of your publicly disclosed intermediate certificates that chain up to certificates in Mozilla's CA program, and contains the required information according to section 10 of Mozilla's CA Certificate Inclusion Policy. If you decide to use the mozilla.org Bugzilla system to provide this information, then file the bug against the "CA Certificates" component of the "mozilla.org" product. (https://bugzilla.mozilla.org/enter_bug.cgi?product=mozilla.org&component=CA%20Certificates)

Additionally, please respond with one of the following:

A) All intermediate certificates chaining up to our certificates in Mozilla's CA program are either disclosed as requested above, or are technically constrained according to section 9 of Mozilla's CA Certificate Inclusion Policy. B) We request an extension for the following specific subordinate CAs who need more time to transition from their legacy systems to their new CA hierarchy: <list of issuer hash, issuer public key hash, and certificate serial number>. For each subordinate CA who needs to operate in their legacy design a little longer, the attached document explains the reason that continued operation is needed and their target date for resolution. <attach document(s) to response>
--


Also, re-ordered the items in
https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Behavior_Changes
to (hopefully) make things more clear.


Hopefully this CA Communication will be ready to send on Monday.

Thanks,
Kathleen





_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to