Thanks for pointing out my oversight, Rob. When I read that first paragraph I 
skipped over the first word, which is an important first word!

I was a little thrown by the last sentence, "a single issuing CA". I took that 
to mean root cert, but I guess they meant any intermediate within the chain? 

Does anyone have insight into why Microsoft wants to do this? Without the 
enforcement this is just a "you have to promise not to do this" and "okay we 
won't" situation. I don't see any point in that. 


  Original Message  
From: Rob Stradling
Sent: Wednesday, May 14, 2014 8:07 AM
To: [email protected]; [email protected]
Subject: Re: QuoVadis Request to Include Renewed Roots

On 14/05/14 13:54, [email protected] wrote:
> By my reading of the Microsoft requirements using separate intermediates is 
> insufficient: they must be root certificates.

Peter, my reading of the Microsoft requirements [1] is that using 
separate intermediates is sufficient (although note the EKU requirement 
for non-legacy intermediates).


"INTERMEDIATE / ISSUING CA CERTIFICATES
...
Separation of SSL and Code Signing Key Uses

Intermediate CA certificates under root certificates submitted for 
distribution by the Program must be configured to separate server 
authentication (SSL) from code signing and time stamping uses. A single 
issuing CA must not be used to issue both server authentication and code 
signing certificates.

Rollover root certificates will not be accepted that combine server 
authentication with code signing uses unless the uses are separated by 
application of EKUs at the intermediate CA certificate level that are 
reflected in the whole certificate chain."


[1] 
http://social.technet.microsoft.com/wiki/contents/articles/1760.windows-root-certificate-program-technical-requirements-version-2-0.aspx


> I'm not familiar with their reasoning behind that but I can imagine cases 
> where that could be a good idea (a consequence of Heartbleed perhaps). 
> Whatever the case may be, if you're going to have the rule then some 
> enforcement mechanism is necessary hence the need for a code-signing-only 
> cert in the trust store.
>
> I also would like to see an official statement regarding when the current 
> QuoVadis certs in the trust store may be removed. We should require a time 
> certain for when the "replaced certs" should be considered obsolete and thus 
> revoked via removal.
>
>
> Original Message
> From: Stephen Davidson
> Sent: Monday, May 12, 2014 8:32 AM
> To: Chema López; Kathleen Wilson
> Cc: [email protected]
> Subject: RE: QuoVadis Request to Include Renewed Roots
>
> QuoVadis is compliant with the Microsoft requirements, and has implemented 
> separate SHA256 intermediate CAs for the issuance of code signing 
> certificates. (More precisely stated, QuoVadis SSL certificates are not 
> issued from the same intermediate CAs as time stamping and code signing 
> certificates).
>
> Kind regards, Stephen Davidson
> QuoVadis‎
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to