On 6/3/14, 1:52 AM, Rob Stradling wrote:
On 03/06/14 01:42, Kathleen Wilson wrote:
On 5/28/14, 5:17 PM, Kathleen Wilson wrote:
<snip>
I could create another spreadsheet for SubCAs that are in CRL/OCSP mode,
and it could have columns for
Name of SubCA (optional)
SubCA Cert's Issuer Hash
SubCA Cert's Issuer Public Key Hash
SubCA Cert Issuer Serial Number
Date of last cert issuance
Date of last cert expiration
<snip>
I also added:
<snip>
     - For each subordinate CA certificate that is being phased out and
is in 'CRL/OCSP only' mode, please provide the following information:
Name of SubCA (optional), SubCA Cert Hash (SHA1),

Kathleen, you didn't previously mandate any particular hash algorithm.
Our disclosure page shows the SHA-256 hash of each Sub-CA certificate.
Is that acceptable, or do you want us to show the SHA-1 hash of each
Sub-CA certificate instead?

SubCA Cert Key Id Hash (SHA1), SubCA Cert Subject Key Identifier,

These will be identical in the common case that the Subject Key
Identifier is generated using the method described in RFC5280 Section
4.2.1.2(1)...
   "The keyIdentifier is composed of the 160-bit SHA-1 hash of the
    value of the BIT STRING subjectPublicKey (excluding the tag,
    length, and number of unused bits)."

Or have I misunderstood what you meant by "SubCA Cert Key Id Hash" ?

Thanks.

SubCA Cert Serial Number,
Date of Last Cert Issuance, Date of Last Cert Expiration.


Updated...

https://wiki.mozilla.org/CA:CertificatePolicyV2.1#Frequently_Asked_Questions
--
5. The transition of some subordinate CAs to Technical Constraints (as per #9 of Mozilla's CA Certificate Inclusion Policy) has been accomplished by creating a new CA hierarchy, so the old subordinate CA certificate remains in 'CRL/OCSP only' mode until all certificates in the old hierarchy have expired. Do we need to disclose the old subordinate CA certificates that are being phased out and are in 'CRL/OCSP only' mode? --For each subordinate CA certificate that is being phased out and is in 'CRL/OCSP only' mode, please provide the following information: Name of SubCA (optional), SubCA Cert Hash (SHA1 or SHA256), SubCA Cert Subject Key Identifier, SubCA Cert Serial Number, Date of Last Cert Issuance, Date of Last Cert Expiration.
--

Thanks,
Kathleen

PS: I'm looking into automating CA and subCA data maintenance. My goal is for CAs to maintain their own data, so I just have to approve changes. More to come about this later, but if any of you have awesome ideas about how to do this, please send me an email with your recommendations.







_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to