Kathleen, 

Can you explain #5 a bit?  I apologize if this was previously answered, but
does this rule apply to all intermediates used by the CA itself or only
those existing outside of the CA's PKI?  Seems like ones operated solely by
Te CA(and covered by the CA's audit) don't necessarily require disclosure
(since they are under the audit). My confusion comes because of the use of
"cross-certificate" in some parts of 8 where as other sections use
"subordinate CA certificates".  Can this be clarified?

Jeremy

-----Original Message-----
From: dev-security-policy
[mailto:dev-security-policy-bounces+jeremy.rowley=digicert.com@lists.mozilla
.org] On Behalf Of Kathleen Wilson
Sent: Thursday, May 8, 2014 2:06 PM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: DRAFT: May CA Communication

On 5/6/14, 12:05 PM, Kathleen Wilson wrote:
> On 5/2/14, 1:36 PM, Peter Bowen wrote:
>>> I don't think the policy allows for "c" (in regards to SSL certs). I 
>>> hope that eventually all of the non-technically constrained 
>>> intermediate certs will be part of some sort of database of allowed 
>>> (known and audited) intermediates. Then SSL certificate path 
>>> validation would fail if the chain contained an intermediate cert 
>>> that was not technically constrained and was not in the database.
>>>
>>> There's still plenty of work to do before this will be viable.
>>>
>>> Perhaps you're noticing an issue with the text in the CA Communication?
>>
>> You had proposed adding a C) for CAs who say they need more time for 
>> some subordinate CAs.  I'm proposing that they should be required 
>> explicitly choose A, B, or C for each CA certificate in the heirarchy 
>> and to disclose some data about the C certs if Mozilla is going to 
>> allow them more time, so there is visibility into how many CA certs 
>> are out there that are not compliant with the policy.
>>
>
> How about the following:
>
>
> https://wiki.mozilla.org/CA:Communications#DRAFT_for_May.2C_2014

Tweaked it some more...
--
5) Send Mozilla information about your publicly disclosed intermediate
certificates that chain up to certificates in Mozilla's CA program, as per
Items #8, 9, and 10 of Mozilla's CA Certificate Inclusion Policy.

Please provide a URL to a web page or a Bugzilla Bug Number that lists all
of your publicly disclosed intermediate certificates that chain up to
certificates in Mozilla's CA program, and contains the required information
according to section 10 of Mozilla's CA Certificate Inclusion Policy. If you
decide to use the mozilla.org Bugzilla system to provide this information,
then file the bug against the "CA Certificates" component of the
"mozilla.org" product. 
(https://bugzilla.mozilla.org/enter_bug.cgi?product=mozilla.org&component=CA
%20Certificates)

Additionally, please respond with one of the following:

     A) All intermediate certificates chaining up to our certificates in
Mozilla's CA program are either disclosed as requested above, or are
technically constrained according to section 9 of Mozilla's CA Certificate
Inclusion Policy.
     B) We request an extension for the following specific subordinate CAs
who need more time to transition from their legacy systems to their new CA
hierarchy: <list of issuer hash, issuer public key hash, and certificate
serial number>. For each subordinate CA who needs to operate in their legacy
design a little longer, the attached document explains the reason that
continued operation is needed and their target date for resolution. <attach
document(s) to response>
--


Also, re-ordered the items in
https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Behavior_Change
s
to (hopefully) make things more clear.


Hopefully this CA Communication will be ready to send on Monday.

Thanks,
Kathleen





_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to