Great!  Thanks!

-----Original Message-----
From: dev-security-policy
[mailto:dev-security-policy-bounces+jeremy.rowley=digicert.com@lists.mozilla
.org] On Behalf Of Kathleen Wilson
Sent: Tuesday, May 13, 2014 11:47 AM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: DRAFT: May CA Communication

On 5/13/14, 8:46 AM, Jeremy Rowley wrote:
> That actually clears things up.  Intermediate certs aren't required to 
> have an EKU but, if they do and the intermediate will be used for SSL, 
> they must have the id-kp-serverAuth (1.3.6.1.5.5.7.3.1) EKU.
>
>


I think I understand the concern now.

I have updated the wiki page to add a bullet point to try to make this more
clear.

https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Things_for_CAs_
to_Fix
"1. All new intermediate certificates that include the EKU extension and
will be used for SSL certificate issuance, must include the id-kp-serverAuth
(1.3.6.1.5.5.7.3.1) EKU. Mozilla will stop recognizing the "Netscape Server
Gated Crypto (2.16.840.1.113730.4.1)" EKU.
     - Intermediate certificates are not required to have an EKU, but if an
intermediate certificate does have an EKU and the intermediate will be used
for SSL, then it must have the id-kp-serverAuth EKU. See sections #8, 9, and
10 of Mozilla's CA Certificate Inclusion Policy."

OK?

Thanks,
Kathleen



_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to