Is there a list of Extended Key Usages that are within scope for the
Mozilla CA Program?

The definition for technically constrained indicates that the CA
certificates must include all EKUs that the CA is authorized to issue
certificates for.  I assume if the only included EKUs are not in scope
for the Mozilla CA Program, then any further subordinate CAs are not
in scope.  For example, if UberRootCA is in the NSS root certificate
store, and it issues PrivateChildA with CA=TRUE in BasicConstraints
and the only OID in the EKU is 2.999.1.27288.9, then any certificates
subordinate to PrivateChildA are out of scope, regardless of their
content.

Thanks,
Peter
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to