On 8/20/14, 2:03 PM, Peter Bowen wrote:
On Wed, Aug 20, 2014 at 1:55 PM,  <[email protected]> wrote:
I've encountered a wildcard end-entity certificate on a live server that chains 
directly to the root cert. There is no intermediate certificate and the root is 
in the Mozilla trust store.

I assume this is a frowned upon practice that will be stopped as the BRs are 
adopted and such certs expire naturally. There is n‎o reason for such certs to 
be reissued indefinitely, is there?
‎


BR section 1: Except where explicitly stated otherwise, these requirements apply only to relevant events that occur on or after the Effective Date.

BR Document History: Version 1.0 of the Baseline Requirements
Adopted 22-Nov-11
Effective Date: 01-Jul-12

BR #9.2.1: Wildcard FQDNs are permitted.

BR #11.1.3: If a wildcard would fall within the label immediately to the left of a registry-controlled† or public suffix, CAs MUST refuse issuance unless the applicant proves its rightful control of the entire Domain Namespace. (e.g. CAs MUST NOT issue “*.co.uk” or “*.local”, but MAY issue “*.example.com” to Example Co.).

BR #12: "Root CA Private Keys MUST NOT be used to sign Certificates except in the following cases:..."

I should have included the dates. Validity period is November 2010 to
2015.‎

The certificate was issued prior to the BR Effective Date, so the BRs don't apply to this particular cert.

Wildcard certs that are issued today need to conform to the BRs, including section 11.1.3 and section 12.


Beyond this one case I'm wondering if there are any survey data or anecdotes 
about how common a practice this is (was?).


I don't know if anyone has studied how common it is/was to issue a wildcard cert directly from a root.

Kathleen

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to