On 30/03/15 16:34, Richard Barnes wrote:
> Adding the intermediates would allow CNNIC to continue to issue end-entity
> certificates, and not penalize site owners immediately (as Peter notes).
> However, it would prevent the acceptance of other intermediates, since the
> improper issuance of intermediates is the immediate issue here.

This is only true if we are aware of all existing in-use CNNIC
intermediates, and that they all have an explit pathLength constraint of
0. A higher constraint, or none at all, would allow CNNIC to issue
further intermediates off the whitelisted intermediates.

> As a compromise, however, I would be willing to add the CNNIC intermediates
> to the Mozilla root list (F).  (Ideally, with an additional path length
> constraint, set to zero.)

Ah, I see you have covered this. If the CNNIC intermediates do not have
such a constraint, we could add one artificially, but AIUI that would
require custom code.

> Since CNNIC's policy regarding intermediates is the immediate issue here,
> this seems like a reasonable compromise.  However, these intermediate
> certificates should not be admitted indefinitely.  Rather, we should plan
> to remove them after a fixed time (say 6 months) or after CNNIC's
> re-application is resolved, whichever comes first.

If CNNIC are required to re-apply from scratch, I believe the current
length of the application queue is longer than six months. That would
mean that it's likely the time limit you set would expire before the
determination of their re-inclusion.

Gerv

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to