Erwann,

Thank you for your input, it was insightful.  See our responses below.

Comment 1:
Intermediate certificates include EKU OIDs for IPSec {Tunnel, User, End 
System}, which is weird; why would anyone want a *public* certificate to 
authentify against a virtual *private* network? That's not a blocker. These EKU 
OIDs are obsolete anyway.
[IdenTrust answer] These Intermediate CAs are used to issue both SSL and device 
certificates. Some of those device certificates still require those EKU OIDs, 
in some cases in combination with Server Auth EKU OID. At this time, there is 
not a strict requirement of separation of SSL versus other device certificates. 
 We are following discussions about the idea of having a dedicated intermediate 
CA to SSL.  If this were to become a requirement, we will become compliant that 
that time.

Comment 2:
The sha2ssl-acesvalid subscriber certificate includes the BR IV policyId OID, 
but this OID isn't granted to the issuer. Not a blocker, but if a RP 
explicitely requires this OID to be present, this chain will be rejected (see 
recent discussions on CABForum about CP OID chaining).
[IdenTrust answer] We have followed the discussion in CAB Forum and we agree 
with the approaches that were discussed there.  We will be making a change to 
either the subordinate CA (resigning) or to the end-entity profiles (removing 
second OID).  We will update the list on what approach we will take.


Comment 3:
The OCSP responders both include too many certificates, this has a performance 
impact for your users; no need to include intermediate and root certificates in 
the response. Not a blocker.
[IdenTrust] You are correct that there is some performance impact. 
 However, this approach is consistent with the RFC 6960 section 4.2.2 - Basic 
Response: "The responder MAY include certificates in the certs field of 
BasicOCSPResponse that help the OCSP client verify the responder's signature." 
In our experience, SSL certificates are used by clients other than browsers; 
and, unfortunately, some clients are not able to do proper path construction. 
For those cases, and we have had some, we provide those certificates.  

Comment 4:
The OCSP responders answer "unknown" when asked to verify the 2 given 
intermediate certificates. Not a blocker, but probably not expected.
[IdenTrust] Our configuration was incorrect in the OCSP.  We have corrected it 
and you should be able to receive the appropriate responses.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to