On 5/12/14, 4:07 PM, Jeremy Rowley wrote:
Won't this policy encourage bad naming practices in intermediate
certificates?  If a CA creates an intermediate certificate for Company ABC,
I'd name it "Intermediate Cert 1" to conceal which customer is using the
certificate.


I think if someone was truly concerned about others knowing that a particular CA issued an intermediate certificate to Company ABC, then they would name it "Intermediate Cert 1" regardless of this policy.

If Company ABC's intermediate certificate signs SSL certs for public websites, then that information will become public knowledge soon enough already.


Simply requiring disclosure of the cross-certs existence
accomplishes little unless it is accompanied by disclosure of the
Subordinate CA since the real value is knowing whether the certificates are
controlled by the audited CA or an audited third party.


I think it depends on what you want to do with the information. For instance, if all intermediate certs are either technically constrained (via EKU and name constraints) or publicly disclosed and audited, then someone could create a database representing the publicly disclosed intermediate certs. Then if an SSL cert chains to an intermediate that is not technically constrained, the database can be checked, and if the intermediate is not there, then an error can be generated.



Also, I don't see how "for each subordinate CA who needs to operate in their
legacy design a little longer, the attached document explains the reason
that continued operation is needed and their target date for resolution.
<attach document(s) to response>" fits with the requirement that either the
intermediate be disclosed or technically constrained.  Why is this an
option?  Can't you disclose they exist without affected the certificate's
continued operation? What constitutes a "Legacy Design" in this case?
Something that can't be audited or constrained?


It doesn't meet the requirement. It just gives them a little more time to meet the requirement.

For some CAs' customers, there may be situations that occurred that prevented them from meeting the target date, as happens for many software projects. For instance, they could have begun the rollover to a new hierarchy, but discovered a problem that required further design and delay. And, for whatever reason, the customer may not want their legacy system to be publicly disclosed.

Kathleen




_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to